Movatterモバイル変換


[0]ホーム

URL:


US5351293A - System method and apparatus for authenticating an encrypted signal - Google Patents

System method and apparatus for authenticating an encrypted signal
Download PDF

Info

Publication number
US5351293A
US5351293AUS08/011,883US1188393AUS5351293AUS 5351293 AUS5351293 AUS 5351293AUS 1188393 AUS1188393 AUS 1188393AUS 5351293 AUS5351293 AUS 5351293A
Authority
US
United States
Prior art keywords
terminal
cryptographic challenge
challenge block
variable
cryptographic
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Expired - Lifetime
Application number
US08/011,883
Inventor
John R. Michener
Benjamin Samit
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
CRYPTOLOGICS INTERNATIONAL Inc
Wave Systems Corp
Original Assignee
Wave Systems Corp
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wave Systems CorpfiledCriticalWave Systems Corp
Priority to US08/011,883priorityCriticalpatent/US5351293A/en
Assigned to CRYPTOLOGICS INTERNATIONAL, INC.reassignmentCRYPTOLOGICS INTERNATIONAL, INC.ASSIGNMENT OF ASSIGNORS INTEREST.Assignors: MICHENER, JOHN R., SAMIT, BENJAMIN
Assigned to WAVE SYSTEMS CORP.reassignmentWAVE SYSTEMS CORP.CHANGE OF CORPORATE NAME OF ASSIGNEEAssignors: CRYPTOLOGICS INTERNATIONAL, INC.
Application grantedgrantedCritical
Publication of US5351293ApublicationCriticalpatent/US5351293A/en
Anticipated expirationlegal-statusCritical
Assigned to MARBLE BRIDGE FUNDING GROUP, INC.reassignmentMARBLE BRIDGE FUNDING GROUP, INC.SECURITY INTEREST (SEE DOCUMENT FOR DETAILS).Assignors: WAVE SYSTEMS CORP.
Expired - Lifetimelegal-statusCriticalCurrent

Links

Images

Classifications

Definitions

Landscapes

Abstract

A cryptographic communications system includes a method and apparatus for exchanging messages between a user terminal, containing a secret key, and an operations center wherein each party authenticates signals received from the other party before any other information is exchanged. An initial identification message from the user terminal to the operations center contains an encrypted value of current time. The operations center checks the received message against local time to verify real time concurrent operation of the user terminal. Subsequently, the operations center and the user terminal mutually exchange encrypted challenge blocks, and each provide respective encrypted responses to the encrypted challenge blocks. The challenge and response exchanges demonstrate that each knows the secret key stored in the user terminal before other information, such as downloaded credit or uploaded data usage, is exchanged. In particular, the challenge and response messages exchange a first random number generated in the user terminal and a second random number generated in the operations center, which are variables used in conjunction with the user secret key to generate a new session key for encrypting the remainder of the messages exchanging data in the communication session.

Description

FIELD OF THE INVENTION
The present invention relates to secure cryptographic communications systems, and particularly to a method and apparatus for authenticating an encrypted signal in a secure cryptographic communications system.
BACKGROUND OF THE INVENTION
In U.S. Pat. No. 4,827,508 to Shear, or U.S. Pat. No. 5,010,571 to Katznelson, a system for metering the access to encrypted data in a CD ROM database is disclosed. Briefly, in Shear or Katznelson, a CD ROM containing an encrypted database of interest to a user is distributed typically at nominal cost or at no cost. The user terminal includes a CD ROM reader, and a remote cryptographic control unit which is provided with stored cryptographic keys needed to access to the database. The amount of actual data use, i.e. the retrieval and decryption of data from the CD ROM, is metered locally and recorded as a stored data usage record. The charge for data access may be either in accordance with the amount of data decrypted, or in accordance with price information recorded in the respective data headers of each individual data packet.
The local stored data usage record is reported (uploaded) by telephone modem (or other telecommunications link) from tile remote user terminal to a cryptographic operations center. Each remote cryptographic control unit has a stored user secret key, unique to that user terminal. Communication between the user terminal and the cryptographic operations center is protected by encryption under the user secret key, which is stored in a secure memory in the cryptographic control unit. The user secret key for each user is also stored in the cryptographic operations center. When a remote user terminal calls in and identifies itself, the cryptographic operations center looks up the corresponding user secret cryptographic user key, which is then used to secure the subsequent communication data exchange between the remote user terminal and the cryptographic operations center. Also stored in the cryptographic operations center are the various cryptographic keys corresponding to the available CD ROM database titles. The user secret key is also used to secure the delivery of secret database keys from the cryptographic operations center to the user terminal for a desired CD ROM database.
As indicated, the remote cryptographic control unit reports data usage by telephone modem. After the data usage report is successfully uploaded to the cryptographic operations center, the user is then billed for the actual database usage based on the content of the uploaded data usage report. Thus, rather than being required to purchase an entire CD ROM database, the user pays only for the amount of data actually used or decrypted from the CD ROM.
Typically, the remote cryptographic control unit in the user terminal contains a credit register. The credit register limits the amount of data which may be decrypted before requiring a usage data report to be uploaded to the cryptographic operations center. For each data purchase recorded in the data usage record, a debit is made from the credit register. The purpose of the credit register is to prevent unlimited access to the database without reporting and paying for data usage. If the available credit is exhausted, no further data decryption is allowed until the past data usage record is reported by the user terminal to the cryptographic operations center, and a new amount of credit is then downloaded to the user terminal.
The data communication channel by telephone modem between the user terminal and the cryptographic operations center is presumed not to be secure against electronic eavesdroppers who may record and study data exchanges. Therefore, the uploaded data usage report, and the downloaded credit transaction functions are system features subject to attack by pirates to avoid payment. For example, a pirate might attempt to record and later repeat the previous transmissions of either the user terminal or the cryptographic operations center (also known as an echo attack). That is, a pirate might simulate the cryptographic operations center, i.e. act as imposter, to download fresh credit to the user terminal. In another form of attack, the pirate might simulate the output of the remote user terminal in order to transmit a false record of usage data to the cryptographic operations center. Therefore, it is critical that both the remote cryptographic control unit in the user terminal, and the cryptographic operations center, accurately authenticate messages from each other before any data usage records are uploaded and committed, or any credit authorization is downloaded, or data of any other kind is exchanged and acted upon.
SUMMARY OF THE INVENTION
The present invention is embodied in a communication system including a method and apparatus for communication between a user terminal containing a remote cryptographic control unit (CRYPTO unit) and a cryptographic operations center (OPC).
To guard against echo attacks, a first communication from the CRYPTO unit contains an encrypted value of current time. The OPC decrypts the encrypted value of current time and checks the result against the local value of current time. If the received encrypted value of current time is not within a given range of the local value of current time, the OPC disconnects the telephone modem link. Thus, echo attacks using previously recorded transmissions at an earlier value of time, will not be successful.
In another aspect of the present invention, the CRYPTO unit and the OPC exchange mutual encrypted challenge blocks and receive mutual respective encrypted responses to the encrypted challenge blocks to demonstrate that each knows the secret keys before any further information, such as downloaded credit or uploaded data. usage, is exchanged. Two random numbers, a first random number and second random number, are generated in the CRYPTO unit and OPC respectively. A first communication session key, Kcom, is derived from another random number generated in the CRYPTO unit, and the user secret key, Ks. After the encrypted challenge blocks are exchanged, a second communication session key, Kcom2, is formed from the two successful challenges, and in particular, Kcom2 is from the first and second random numbers which were successfully exchanged by the mutual encrypted challenge blocks and responses.
More specifically, the OPC begins by transmitting an encrypted OPC challenge block based on the OPC generated random number. The CRYPTO unit response to the OPC challenge includes the OPC random number decrypted from the received OPC challenge block in an exclusive OR function with current time (xxusing the same time value as the previously sent encrypted value of current time) and encrypted under the user secret key, Ks. The CRYPTO unit also transmits an encrypted challenge block of its own based on the CRYPTO unit randomly generated number.
The OPC checks the CRYPTO unit response against the same exclusive OR function of current time (xxalso using the same time value as the previously received and stored encrypted value of current time), and if not equal, disconnects the telephone modem link. If the CRYPTO unit response is valid, the OPC generates a response to the CRYPTO unit challenge block based on the CRYPTO unit random number derived from the CRYPTO unit challenge block and the user secret key, Ks. The first and second random numbers function as first and second variables which differentiate one communication session from another.
The response from the OPC is checked by the CRYPTO unit against the original CRYPTO unit random number, and if not equal, the CRYPTO unit disconnects the telephone modem link. Otherwise, the CRYPTO unit and the OPC then independently generate the second common communication key, Kcom2, based on the first and second random numbers and the user secret key, Ks, which second communication key is used for the remainder of the communication session.
Both the OPC challenge and CRYPTO challenge messages were encrypted under keys based on Ks, the CRYPTO unit secret key. Thus, both the CRYPTO unit and the OPC demonstrate to the other that each knows Ks, while protecting the value of Ks from eavesdroppers. After the challenges are successful, communication is encrypted under the second communication key, Kcom2.
The OPC and the CRYPTO unit are able to generate the common second communication key from the previous successful challenges and responses. Thus, the common second communication key is based the OPC and CRYPTO unit random numbers which were successfully exchanged in a sequence based in part on the value of current time.
Viewed differently, three tests of signal origin authenticity are exchanged: a first test message to verify that both units are operating in the same time frame, a challenge to verify that the CRYPTO unit knows its own secret key, and a challenge to verify that the OPC knows the CRYPTO unit secret key. Only if the time test and both challenges are passed, is a new (second) communication key forged from current time and the two random numbers created and exchanged during the successful mutual challenges.
Finally, it should be appreciated that in addition to the present application to metering and reporting usage of CD ROM encrypted databases, the present invention may be used to authenticate remote units and provide secure communications between any two communicating devices. For example, the present invention may be used to authenticate communications between banking terminals reporting financial transactions, and the like.
BRIEF DESCRIPTION OF THE DRAWING
FIG. 1 is a block diagram of a system embodying the present invention for reporting metered access to an encrypted CD ROM database.
FIG. 2 is a block diagram illustrating the communication protocol between a remote cryptographic control unit and an operation center for authenticating an encrypted signal in accordance with the present invention.
FIG. 3 is a flow chart diagram illustrating a method for generating a real time identification message in a remote cryptographic control unit in accordance with the present invention.
FIG. 4 is a flow chart diagram illustrating a method for verifying a real time identification message, and for generating a first cryptographic challenge in an operations center in accordance with the present invention.
FIG. 5 is a flow chart diagram illustrating a method for generating a first cryptographic challenge response, and for generating a second cryptographic challenge in a remote cryptographic control unit in accordance with the present invention.
FIG. 6 is a flow chart diagram illustrating a method for verifying a first cryptographic challenge response, and for generating a second cryptographic challenge response in an operation center in accordance with the present invention.
FIG. 7 is a flow chart diagram illustrating a method for verifying a second cryptographic challenge response, and for generating a second communication key in a remote cryptographic control unit in accordance with the present invention.
FIG. 8 is a flow chart diagram illustrating a method for generating a second communication key in an operation center in accordance with the present invention.
DETAILED DESCRIPTION
A system for metering and reporting the access to encrypted data in a CD ROM database is illustrated in block form in FIG. 1. The system includes aninformation publisher 14, auser terminal 16 and anOPC 12. Theuser terminal 16 is typically a personalcomputer containing CPU 18,CD ROM reader 20,modem 19, and a remotecryptographic control unit 10. Theuser terminal 16 is linked to theOPC 12 through a telephoneline modem connection 17.
In operation,information publisher 14 provides an encrypted CD ROM to theuser terminal 16. The user inserts the encrypted CD ROM into theCD ROM player 20. Using search and retrieval software in the user's personal computer,CPU 18 performs searches on the encrypted CD ROM database. In order to use the results of the search, the CPU requests that theCRYPTO unit 10 decrypt the desired data packet from theCD ROM player 20.
If the CRYPTO unit has previously been provided with the necessary database keys for the particular encrypted CD ROM, and there is sufficient credit in the internal credit register, then theCRYPTO unit 10 will decrypt the desired data packet. Thereafter, the cost of the decrypted data will be subtracted from the internal credit register. In addition, a record of the purchase and decryption of the data packet will be recorded in a stored data usage record.
At some point, in order to report data usage and replenish credit, theCRYPTO unit 10 will establish a telephone modem line connection to theOPC 12. TheCRYPTO unit 10 will call the OPC if 1) the amount of available credit is exceeded, 2) the amount of available space for recording the data usage record is exceeded, 3) a fixed time period has elapsed, or 4) the user initiates a command which causes theCRYPTO unit 10 to call theOPC 12.
In any event, theCRYPTO unit 10 commands themodem 19 to establish atelephone link 17 to theOPC 12. After a telephone link is established, theCRYPTO unit 10 identifies itself to theOPC 12, which initiates a series of message exchanges to establish to theOPC 12 that theCRYPTO unit 10 is authentic. TheCRYPTO unit 10 also initiates a series of message exchanges to establish to theCRYPTO unit 10 that theOPC 12 is authentic.
Following the authentication exchanges, theCRYPTO unit 10 reports its data usage record to theOPC 12. TheOPC 12 uses the uploaded data usage record to inform theinformation publisher 14 as to the use of its published CD ROM database by theuser terminal 16. Also, assuming that the user pays for data decrypted from the CD ROM, and the user is otherwise credit worthy, then theOPC 12 may download additional credit data to theCRYPTO unit 10 over thetelephone link 17. Theinformation publisher 14 also provides database keys to theOPC 12 over thetelephone link 17 for any published CD ROM which may be supplied to the CRYPTO unit. The session is thereafter terminated and theCRYPTO unit 10 will have sufficient credit and database keys to continue to use and access encrypted databases in the CD ROM inplayer 20.
As used herein, the preferred encryption and decryption process is the Data Encryption Standard, or DES, well known to those skilled in the art. Briefly, for encryption, an input data block of 64 bits is transformed into an output data block of 64 bits in accordance with a 56 bit key. For decryption, the reverse process is carried out, also using the same 56 bit key. Therefore, the encryption key must be communicated from the information publisher to the user in order to decrypt the received communication. DES keys are typically represented in 64 bits (8 byte) quantities, with each byte having 7 bits plus 1 parity bit, or 56 key bits plus 8 parity bits.
Also, as used herein, the phrase "perform an encrypted keyload" of a variable under a secret key means to encrypt (or decrypt) that variable (usually a key) under the secret key to generate another key using the data encryption standard (DES). Encryption may be performed under a single key, or under multiple keys, such as triple keyset, for example. For triple encryption, a keyset of three keys are used to encrypt a variable using DES as follows: encrypting with key 1, decrypting with key 2, and encrypting with key 3. Triple key decryption is the reverse--decrypting with key 3, encrypting with key 2, and then decrypting with key 1.
FIG. 2 illustrates the data exchange protocol between the OPC and the CRYPTO unit. First, a realtime identification message 140, encrypted under Kcom, is transmitted from theCRYPTO unit 10 to theOPC 12. The realtime identification message 140 consists of a remote cryptographic unit identification (CID), a randomly generated key, Kmc, and ETlog, an encrypted version of current time. TheOPC 12 receives the realtime identification message 140 to verify that theCRYPTO unit 10 is operating in real time. In response, theOPC 12 generates andOPC challenge message 142 comprising two randomly generated numbers, Copc and Kmopc, encrypted under a session communications key, Kcom, to form ECopc and EKmopc.
TheCRYPTO unit 10 receives theOPC challenge message 142 and forms a response, Rxor, based in part on the value of current time, and encrypt Rxor under Kcom to form ERxor. In addition, theCRYPTO unit 10 forms a challenge of its own, essentially a random number, Cc encrypted under Kcom to form ECc. TheCRYPTO unit 10 transmits the CRYPTO response to the OPC challenge and the CRYPTO challenge inmessage 144, encrypted under the Kcom to theOPC 12.
TheOPC 12 checks the CRYPTO response to the OPC challenge to determine whether or not theCRYPTO unit 10 is authentic. Essentially, the OPC challenge block and the CRYPTO unit response to the OPC challenge block proves to theOPC 12 that theCRYPTO unit 10 knows its own secret key. TheOPC 12 also responds to the CRYPTO challenge by providing an OPC response, Rc. The OPC response, Rc, is encrypted under the Kcom to form ERc, the OPC response to CRYPTO challenge,message 146.
TheCRYPTO unit 10 checks the OPC response to the CRYPTO unit challenge to determine whether theOPC 12 is authentic. Essentially, the CRYPTO unit challenge block and the OPC response to the CRYPTO unit challenge block proves to the CRYPTO unit that theOPC 12 knows the CRYPTO unit secret key.
At this point, two challenge messages and two challenge responses have been exchanged between theCRYPTO unit 10 and theOPC 12. TheCRYPTO unit 10, then generates a new communication session key, Kcom2, from the OPC and the CRYPTO unit challenges. The new communication session key is used to encrypt CRYPTO unit status data, Mlog, to form amessage 148 from theCRYPTO unit 10 to theOPC 12. TheOPC 12 also forms the new communication key, Kcom2, from the OPC and CRYPTO unit challenges to decryptmessage 148 and thereby receive the CRYPTO unit status data Mlog. Having authenticated each unit to the other, a protected encrypted exchange containing the data usage record and the downloaded credit data will follow.
FIGS. 3 through 8 illustrate the foregoing message protocol in greater detail. In particular, FIG. 3 illustrates the generation of the real time identification message in theCRYPTO unit 10. The user secret key, Ks, is stored in a battery backedvolatile RAM memory 22. The user secret key, Ks, is unique to a particular CRYPTO unit and thus different for each individual user.
The remote cryptographic unit identification, CID, is derived from four fixedstrings 28, 30, 32 and 34 respectively stored in theCRYPTO unit 10. The user secret key Ks is used to encrypt the firstfixed string 28 inencryptor 40. The user secret key Ks is also used to encrypt the secondfixed string 30 inencryptor 42, and again to encrypt the thirdfixed string 32 inencryptor 44. The three key outputs ofencryptors 40, 42, and 44 is a working keyset used to triple encrypt the fourthfixed string 34 inencryptor 46. The output ofencryptor 46 is the CRYPTO unit identification number, CID. Although separate encryptors and decrypted are illustrated, it will be understood that a single DES engine may be shared for all cryptographic operations.
In order to initiate a communication session, a random key, Kmc, is created atstep 24, and encrypted under Ks inencryptor 36 to form the session communication key, Kcom. In addition, the CRYPTO unit contains alocal time clock 26 to provide a local time record, Tlog. The local time record, Tlog, is encrypted under Kcom inencryptor 38 to form an encrypted local time record, ETlog. The CRYPTO unit then combines serialized versions of CID, 47 Kmc 25 andETlog 39 into a serial message to form the realtime identification message 140 as shown in FIG. 2.
Thus, as indicated in FIG. 3, the CRYPTO unit performs the following functions:
1. Create CRYPTO unit ID 47 byencrypted keyloads 40, 42, 44 of threetext strings 28, 30, 32 respectively, umber the CRYPTO unitsecret keyset 22 to generate a working keyset. A fourth fixedstring 34 is then triple key enciphered 46 under the working keyset to yield the CRYPTO unit ID, CID 47.
2. Create a random message key, Kmc, atstep 24.
3. Transform Kmc into a communication working keyset, Kcom, byencrypted keyload 36 of Kmc under Ks.
4. Get time value fromlocal clock 26, Tlog. Encrypt 38 Tlog under Kcom.
5. Transmit CID 47, message key 25 andencrypted time 39 to the OPC.
FIG. 4 shows the receipt and processing of the realtime identification message 140. In particular, the message is received on telephone modem link M. The received CID is stored in a register atstep 48, Kms is stored in a register atstep 50, and ETlog is stored in a register atstep 52. The user secret key, Ks, corresponding to the received CID is retrieved fromkeyset library 54.
Keyset library 54 contains the secret keys for all of the users of the system. The user secret key Ks is used to encrypt the received value of Kms inencryptor 58 to form Kcom. In turn, Kcom is used to decrypt the received value of ETlog indecryptor 56 to recover the CRYPTO unit local time record, Tlog. An OPClocal time clock 60 generates a local current time record which is compared to the received time record Tlog inwindow comparator 62. If the received time record Tlog is not within a given range of the OPC clock time log, the two time records are not equal, and the telephone connection between the OPC and the CRYPTO unit is disconnected atstep 64. Tlog is retained for further use by the OPC during the communication session.
However, if the received time record is within range of the local clock time record, then the OPC creates a random challenge number, Copc, at step 66 and a random challenge key, Kmopc, atstep 68. Copc is encrypted under Kcom inencryptor 70 to form ECopc. Kmopc is encrypted under the Kcom inencryptor 74 to form EKmopc. The serialized versions ofECopc 71 andEKmopc 75 form theOPC challenge message 142 as shown in FIG. 2.
Thus, as shown in FIG. 4, the OPC performs the following functions:
1. Receiveinitiation message 140 from the CRYPTO unit on telephone modem link M. Load suppliedvalues 48, 50, 52, contact key server (keyset library) 54 and obtain Ks for CRYPTO unit CID.
2. Create Kcom using Kmc and the retrieved value of Ks, 58.
3.Decrypt ETlog 56. Compare 62 Tlog with local value ofabsolute time 60. If outside of error bounds, log error anddisconnect 64.
4. Create random challenge block Copc 66, and random messagekey Kmopc 68.
5. Encrypt 70 Copc and 74 Kmopc under Kcom and transmit 71, 75 to CRYPTO unit.
In FIG. 5, theOPC challenge message 142 is received on the telephone modem link M. ECopc is received and stored in a register atstep 96, while EKmopc is received and stored in a register atstep 98. The CRYPTO unit then decrypts the received value of ECopc under Kcom indecryptor 102 to form Copc. Also, the received value of EKmopc is decrypted under Kcom indecryptor 104 to form Kmopc, which is in turn encrypted under Ks inencryptor 108 to for Kopc. The previously received and stored value of Tlog is combined in a exclusive ORgate 106 with Copc to form Cxor. Cxor is encrypted under Kopc inencryptor 110 to form Rxor. The response to the OPC challenge is formed at the output ofencryptor 112 in which Rxor is encrypted under Kcom. Also, a random challenge number Cc is formed atstep 100 and encrypted under Kcom inencryptor 114 to form ECc. The serialized values ofERxor 113 andECc 115 form the CRYPTO unit response to the OPC challenge and the CRYPTOunit challenge message 144 in FIG. 2.
Thus, in accordance with FIG. 5 the CRYPTO unit performs the following functions:
1. Receive OPC challenge message from OPC on telephone modem link M. Load receivedvalues 96, 98.
2.Decrypt ECopc 102 andEKmopc 104 using Kcom.
3. Exclusive OR Tlog (concatenated to itself to make an 8 byte quantity) withCopc 106, giving Cxor.
4.Transform Kmopc into Kopc byencrypted keyloads 108 under Ks.
5.Encrypt Cxor 110 under Kopc to create the challenge response Rxor.
6. Create 100 random challenge block Cc.
7.Encrypt Rxor 112 andCc 114 under Kcom and transmit 113, 115 to the OPC.
The CRYPTO unit response to the OPC challenge and the CRYPTO unit challenge is received at the OPC on telephone modem link M in FIG. 6. Erxor is stored in a register atstep 76, and ECc is stored in a register at step 77. ERxor is decrypted indecryptor 78 under Kcom to provide Rxor.
Rxor is also locally generated in the OPC. Towards this end, the exclusive ORgate function 88 of Copc and Tlog provides output Cxor. Tlog is the original time log of current time received from the CRYPTO unit which initiated the current communication session and stored in the OPC. Cxor is encrypted intoencryptor 82 under Kopc. Kopc is generated inencryptor 92 by encrypting Kmopc under Ks as the encryption key. The output ofencryptor 82 is the locally generated version of Rxor which is compared to the received version of Rxor incomparator 84. If Rxor as received is not equal to Rxor as locally generated, then the telephone modem link is disconnected atstep 86. However, if the received and locally generated Rxor are equal, the OPC continues to generate a response atstep 85.
To generate an OPC response to the CRYPTO challenge, Cc is encrypted inencryptor 90 under Kopc as the encryption key. The output ofencryptor 90, Rc, is encrypted inencryptor 94 under Kcom as the encryption key to provide an encrypted response, ERc. Aserial version 95 of ERc forms the OPC response to the CRYPTO challenge inmessage 46 of FIG. 2 which is transmitted from the OPC to the CRYPTO unit.
Thus, the OPC carries out the following process steps:
1. Receive the CRYPTO response to theOPC challenge 76 and the CRYPTO challenge 77.
2.Decrypt Rxor 78 andCc 80 using Kcom.
3. Exclusive OR Tlog (concatenated onto itself to make and 8 byte value) onto Copc giving Cxor.
4. Transform Kmopc to Kopc byencrypted keyloads 92 under Ks.
5.Encrypt Cxor 82 under Kopc and compare 84 with Rxor. If not equal, log error anddisconnect 86.
6.Encrypt Cc 90 under Kopc to create a response block, Rc.
7.Encrypt Rc 94 under Kcom and transmit to the CRYPTO unit asmessage 146 in FIG. 2.
The CRYPTO unit receivesmessage 146 on telephone modem terminal M in FIG. 7. The received ERc is stored in a register atstep 116. ERc is decrypted indecryptor 118 under Kcom to provide the recovered CRYPTO unit challenge Rc. Rc is compared incomparator 122 with the encrypted value of Cc under Kopc at the output ofencryptor 120. If the received and expected values of Rc are not equal, the CRYPTO unit disconnects the telephone modem link atstep 126.
If the received value of Rc is equal to the expected value of Rc, then the communication session continues to generate a second communication session key Kcom2 atstep 123. To generate Kcom2, the received Rc is encrypted under Copc inencryptor 124 to produce Kx, which is in turn encrypted under Ks inencryptor 128 to produce Kcom2.
The communication session in which billing and credit data will be exchanged begins by encrypting Mlog, the stored error andbilling status 129 under Kcom2 inencryptor 130. The output ofencryptor 130 is EMlog which is arranged inserial form 131 and transmitted to the OPC asmessage 148 in FIG. 2.
Thus, the CRYPTO unit performs the following process steps:
1.Receive the OPC response to the CRYPTO unit challenge, ERc.
2.Decrypt ERc 118 using Kcom.
3.Encrypt Cc 120 under Kopc and compare 122 to Rc. If compare fails,disconnect 126.
4.Encrypt Rc 124 using Copc as the key, creating a composite key, Kx.
5. TransformKx 128 to Kcom2 using Ks.
6. Create 129 a status vector describing the CRYPTO unit error status and the billing register disposition Mlog.
7.Encrypt Mlog 130 under Kcom2 and transmit 131 to OPC.
The encrypted status message EMlog is received at the OPC on telephone modem link terminal M and stored in a register atstep 132 in FIG. 8. The new communication key Kcom2 is independently created at the OPC by encrypting Rc under Copc inencryptor 134. The output ofencryptor 134 is encrypted under Ks inencryptor 138 to provide the second communication key Kcom2. The received EMlog is then decrypted indecryptor 136 under Kcom2 to produce Mlog, the billing status of the CRYPTO unit.
Therefore, the OPC performs the following step:
1. ReceiveEMlog 132 from the CRYPTO unit on the telephone modem link.
2.Encrypt Rc 134 using Copc as the key to create Kx.
3. TransformKx 138 to Kcom2 using Ks.
4.Decrypt Mlog 136 using Kcom2, and proceed to direct the CRYPTO unit as a slave device.
Therefore, first the OPC and the CRYPTO unit authenticate messages from each other. Then, other data, such as billing data or credit data is exchanged.

Claims (14)

What is claimed is:
1. In a cryptographic communication system including first and second terminals, said first and second terminals being connected via a telecommunications link, a method for authenticating encrypted signals between said first and second terminals, wherein said first terminal stores a user secret key and wherein said second terminal includes a keyset library memory for storing said user secret key, said method comprising:
sending a first cryptographic challenge block including a first variable, from said second terminal to said first terminal;
receiving said first cryptographic challenge block at said first terminal;
responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said user secret key stored in said first terminal;
receiving said first cryptographic challenge block response at said second terminal;
computing at said second terminal an expected first cryptographic challenge block response;
comparing said received first cryptographic challenge block response to said expected first cryptographic challenge block response in said second terminal; and
disconnecting said telecommunications link between said first and second terminals if said received first cryptographic challenge block response is not substantially equal to said expected first cryptographic challenge block response;
whereby said first terminal authenticates to said second terminal responsive to said cryptographic challenge block that said first terminal stores the same secret key as said second terminal;
sending a second cryptographic challenge block including a second variable, from said first terminal to said second terminal;
receiving said second cryptographic challenge block including said second variable, at said second terminal;
responding to said second cryptographic challenge block by sending from said second terminal a second cryptographic challenge block response based on said first variable in said first cryptographic challenge block, said received second variable in said second cryptographic challenge block and said user secret key stored in said keyset library of said second terminal;
receiving said second cryptographic challenge block response at said first terminal;
computing at said first terminal an expected second cryptographic challenge block response using said first variable received in said first cryptographic challenge block, said second variable in said second cryptographic challenge block and said user secret key stored in said first terminal;
comparing said received second cryptographic challenge block response to said expected second cryptographic challenge block response in said first terminal; and
disconnecting said telecommunications link between said second and first terminals if said received second cryptographic challenge block response is not substantially equal to said expected second cryptographic challenge block response;
whereby said second terminal authenticates to said first terminal responsive to said second cryptographic challenge block that said second terminal stores the same user secret key as said first terminal.
2. A method in accordance with claim 1, wherein said step of responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said user secret key stored in said first terminal, further comprises:
decrypting said received first cryptographic challenge block to obtain said first variable;
generating a current time record;
computing the exclusive OR function of said current time record and said first variable; and
encrypting said exclusive OR function of said current time record and said first variable under a key derived from said user secret key stored in said first terminal.
3. A method in accordance with claim 2, wherein said step of responding to said second cryptographic challenge block by sending from said second terminal a second cryptographic challenge block response based on said first variable from said first cryptographic challenge block, said second variable received in said second cryptographic challenge block and said user secret key stored in said second terminal;
decrypting said received second cryptographic challenge block to obtain said second variable;
encrypting said second variable under a key derived from said first variable, and under a key derived from said user secret key stored in said second terminal.
4. In a cryptographic communication system including first and second terminals, said first and second terminals being connected via a telecommunications link, an apparatus for authenticating encrypted signals between said first and second terminals, wherein said first terminal stores a user secret key and wherein said second terminal includes a keyset library memory for storing said user secret key, said method comprising:
means for sending a first cryptographic challenge block including a first variable, from said second terminal to said first terminal;
means for receiving said first cryptographic challenge block at said first terminal;
means for responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said user secret key stored in said first terminal:
means for receiving said first cryptographic challenge block response at said second terminal;
means for computing at said second terminal an expected first cryptographic challenge block response;
means for comparing said received first cryptographic challenge block response to said expected first cryptographic challenge block response in said second terminal; and
means for disconnecting said telecommunications link between said first and second terminals if said received first cryptographic challenge block response is not substantially equal to said expected first cryptographic challenge block response;
whereby said first terminal authenticates to said second terminal responsive to said cryptographic challenge block that said first terminal stores the same secret key as said second terminal;
means for sending a second cryptographic challenge block including a second variable, from said first terminal to said second terminal;
means for receiving said second cryptographic challenge block including said second variable, at said second terminal;
means for responding to said second cryptographic challenge block by sending from said second terminal a second cryptographic challenge block response based on said first variable in said first cryptographic challenge block, said received second variable in said second cryptographic challenge block and said user secret key stored in said keyset library of said second terminal;
means for receiving said second cryptographic challenge block response at said first terminal;
means for computing at said first terminal an expected second cryptographic challenge block response using said first variable received in said first cryptographic challenge block, said second variable in said second cryptographic challenge block and said user secret key stored in said first terminal;
means for comparing said received second cryptographic challenge block response to said expected second cryptographic challenge block response in said first terminal; and
means for disconnecting said telecommunications link between said second and first terminals if said received second cryptographic challenge block response is not substantially equal to said expected second cryptographic challenge block response;
whereby said second terminal authenticates to said first terminal responsive to said second cryptographic challenge block that said second terminal stores the same user secret key as said first terminal.
5. An apparatus in accordance with claim 4, wherein said means for responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said user secret key stored in said first terminal, further comprises:
means for decrypting said received first cryptographic challenge block to obtain said first variable;
means for generating a current time record;
means for computing the exclusive OR function of said current time record and said first variable; and
means for encrypting said exclusive OR function of said current time record and said first variable under a key derived from said user secret key stored in said first terminal.
6. An apparatus in accordance with claim 5, wherein said means for responding to said second cryptographic challenge block by sending from said second terminal a second cryptographic challenge block response based on said first variable from said first cryptographic challenge block, said second variable received in said second cryptographic challenge block and said user secret key stored in said second terminal;
means for decrypting said received second cryptographic challenge block to obtain said second variable;
means for encrypting said second variable under a key derived from said first variable, and under a key derived from said user secret key stored in said second terminal.
7. In a secure cryptographic communication system including first and second terminals, said first and second terminals being connected via a telecommunications link, a method for providing encrypted signals between said first and second terminals using a first communication session key and a second communication session key, wherein said first and second terminal each store a user secret key for generating said first communication session key common to said first and second terminals, said first communication session key being used for authenticating an encrypted signal in said secure cryptographic communications system, said second communication key being used as an encryption key for secure communications between said first and second terminals, said method comprising:
generating a first variable at said first terminal;
generating a second variable at said second terminal;
exchanging said first and second variables between said first and second terminals using said first communication session key;
forming said second communication session key at each said first and second terminals from said first and second variables; and
using said second communication session key as an encryption key for secure communications between said first and second terminals.
8. A method in accordance with claim 7, wherein said steps of generating said first variable and said second variable comprise generating a first random number and generating a second random number, respectively.
9. A method in accordance with claim 7, wherein said step of exchanging said first and second variables using said first communication session key further comprises:
sending a first cryptographic challenge block from said first terminal to said second terminal by encrypting said first variable using said first communication session key;
receiving said first cryptographic challenge block at said second terminal by decrypting said first variable using said first communication session key;
sending a second cryptographic challenge block from said second terminal to said first terminal by encrypting said second variable using said first communication session key; and
receiving said second cryptographic challenge block at said first terminal by decrypting said second variable using said first communication session key,
whereby said first and second terminals exchange said first and second variables.
10. A method in accordance with claim 9, further including:
generating at said first terminal a time record indication of current time;
sending from said first terminal, an encrypted time identification message containing said indication of current time to said second terminal;
responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said indication of current time; and
selecting said second communication session key at said first terminal based on said generated indication of current time,
selecting said second communication session key at said second terminal based on said received indication of current time,
whereby said second communication key is based said first and second variables which were exchanged between said first and second terminals in a message derived from the value of current time.
11. In a secure cryptographic communication system including first and second terminals, said first and second terminals being connected via a telecommunications link, an apparatus for providing encrypted signals between said first and second terminals using a first communication session key and a second communication session key, wherein said first and second terminal each store a user secret key for generating said first communication session key common to said first and second terminals, said first communication session key being used for authenticating an encrypted signal in said secure cryptographic communications system, said second communication key being used as an encryption key for secure communications between said first and second terminals said apparatus comprising:
means for generating a first variable at said first terminal;
means for generating a second variable at said second terminal;
means for exchanging said first and second variables between said first and second terminals using said first communication session key;
means for forming said second communication session key at each said first and second terminals from said first and second variables; and
means for using said second communication session key as an encryption key for secure communications between said first and second terminals.
12. An apparatus in accordance with claim 11, wherein said means for generating said first variable and said second variable comprise means for generating a first random number and means for generating a second random number, respectively.
13. An apparatus in accordance with claim 11, wherein said step of exchanging said first and second variables using said first communication session key further comprises:
means for sending a first cryptographic challenge block from said first terminal to said second terminal by encrypting said first variable using said first communication session key;
means for receiving said first cryptographic challenge block at said second terminal by decrypting said first variable using said first communication session key;
means for sending a second cryptographic challenge block from said second terminal to said first terminal by encrypting said second variable using said first communication session key; and
means for receiving said second cryptographic challenge block at said first terminal by decrypting said second variable using said first communication session key,
whereby said first and second terminals exchange said first and second variables.
14. An apparatus in accordance with claim 13, further including:
means for generating at said first terminal a time record indication of current time;
means for sending from said first terminal, an encrypted time identification message containing said indication of current time to said second terminal;
means for responding to said first cryptographic challenge block by sending from said first terminal a first cryptographic challenge block response based on said first variable received in said first cryptographic challenge block and said indication of current time; and
means for selecting said second communication session key at said first terminal based on said generated indication of current time,
means for selecting said second communication session key at said second terminal based on said received indication of current time,
whereby said second communication key is based said first and second variables which were exchanged between said first and second terminals in a message derived from the value of current time.
US08/011,8831993-02-011993-02-01System method and apparatus for authenticating an encrypted signalExpired - LifetimeUS5351293A (en)

Priority Applications (1)

Application NumberPriority DateFiling DateTitle
US08/011,883US5351293A (en)1993-02-011993-02-01System method and apparatus for authenticating an encrypted signal

Applications Claiming Priority (1)

Application NumberPriority DateFiling DateTitle
US08/011,883US5351293A (en)1993-02-011993-02-01System method and apparatus for authenticating an encrypted signal

Publications (1)

Publication NumberPublication Date
US5351293Atrue US5351293A (en)1994-09-27

Family

ID=21752371

Family Applications (1)

Application NumberTitlePriority DateFiling Date
US08/011,883Expired - LifetimeUS5351293A (en)1993-02-011993-02-01System method and apparatus for authenticating an encrypted signal

Country Status (1)

CountryLink
US (1)US5351293A (en)

Cited By (153)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5524072A (en)*1991-12-041996-06-04Enco-Tone Ltd.Methods and apparatus for data encryption and transmission
US5557765A (en)*1994-08-111996-09-17Trusted Information Systems, Inc.System and method for data recovery
WO1996037065A1 (en)*1995-05-181996-11-21Defa A/SSecure one-way communication system
WO1997016902A3 (en)*1995-11-021997-08-28Tri Strata Security IncUnified end-to-end security methods and systems for operating on insecure networks
US5715314A (en)*1994-10-241998-02-03Open Market, Inc.Network sales system
US5717756A (en)*1995-10-121998-02-10International Business Machines CorporationSystem and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys
US5724424A (en)*1993-12-161998-03-03Open Market, Inc.Digital active advertising
US5748739A (en)*1994-11-051998-05-05International Computers LimitedAccess control for sensitive functions
US5768382A (en)*1995-11-221998-06-16Walker Asset Management Limited PartnershipRemote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
WO1998037661A1 (en)*1997-02-191998-08-27U.S. Robotics Mobile Communications Corp.Apparatus and method for authentification and encryption of a remote terminal over a wireless link
US5812669A (en)*1995-07-191998-09-22Jenkins; LewMethod and system for providing secure EDI over an open network
US5838790A (en)*1996-04-191998-11-17Juno Online Services, L.P.Advertisement authentication system in which advertisements are downloaded for off-line display
EP0881558A1 (en)*1997-05-281998-12-02Siemens AktiengesellschaftComputer system for protecting software and a method for protecting software
EP0881557A1 (en)*1997-05-281998-12-02Siemens AktiengesellschaftComputer system for protecting software and a method for protecting software
EP0881559A1 (en)*1997-05-281998-12-02Siemens AktiengesellschaftComputer system for protecting software and a method for protecting software
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5910987A (en)1995-02-131999-06-08Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5920861A (en)1997-02-251999-07-06Intertrust Technologies Corp.Techniques for defining using and manipulating rights management data structures
US5943422A (en)1996-08-121999-08-24Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US5947747A (en)*1996-05-091999-09-07Walker Asset Management Limited PartnershipMethod and apparatus for computer-based educational testing
US5956403A (en)*1994-08-111999-09-21Network Association, Inc.System and method for access field verification
US6029154A (en)*1997-07-282000-02-22Internet Commerce Services CorporationMethod and system for detecting fraud in a credit card transaction over the internet
US6052780A (en)*1996-09-122000-04-18Open Security Solutions, LlcComputer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
US6085321A (en)*1998-08-142000-07-04Omnipoint CorporationUnique digital signature
US6088449A (en)*1996-11-052000-07-11Tri-Strata Security, Inc.Tri-signature security architecture systems and methods
US6112181A (en)1997-11-062000-08-29Intertrust Technologies CorporationSystems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
EP0809379A3 (en)*1996-05-222000-10-18Matsushita Electric Industrial Co., Ltd.Authentication apparatus according to the challenge-response principle
US6144988A (en)*1998-07-232000-11-07Experian Marketing Solutions, Inc.Computer system and method for securely formatting and mapping data for internet web sites
US6157721A (en)1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
EP0836774A4 (en)*1995-06-082000-12-13Wave Sys CorpEncrypted data package record for use in remote transaction metered data system
WO2001001630A1 (en)*1999-06-252001-01-04Telefonaktiebolaget Lm Ericsson (Publ)Methods and arrangements for secure linking of entity authentication and ciphering key generation
US6189101B1 (en)1997-10-242001-02-13Richard G. Dusenbury, Jr.Secure network architecture method and apparatus
US6272632B1 (en)1995-02-212001-08-07Network Associates, Inc.System and method for controlling access to a user secret using a key recovery field
US20010034838A1 (en)*2000-01-142001-10-25Motoshi ItoControl program, device including the control program, method for creating the control program, and method for operating the control program
US6356935B1 (en)1998-08-142002-03-12Xircom Wireless, Inc.Apparatus and method for an authenticated electronic userid
US20020073046A1 (en)*1999-07-302002-06-13David Sancho EnriqueSystem and method for secure network purchasing
US20020080972A1 (en)*1996-06-282002-06-27Takehisa KatoMethod and apparatus of enciphering and deciphering data using keys enciphered and deciphered with other keys
US20020110242A1 (en)*2000-12-192002-08-15Bruwer Frederick JohannesMethod of and apparatus for transferring data
US20020120854A1 (en)*2000-09-222002-08-29Levine Richard B.Systems and methods for preventing unauthorized use of digital content
US20020144153A1 (en)*2000-09-222002-10-03Levine Richard B.Systems and methods for preventing unauthorized use of digital content
US6473858B1 (en)1999-04-162002-10-29Digeo, Inc.Method and apparatus for broadcasting data with access control
US20020166048A1 (en)*2001-05-012002-11-07Frank CoulierUse and generation of a session key in a secure socket layer connection
US20020174365A1 (en)*2001-05-212002-11-21Vadim AntonovEnhanced communication scheme for objects in multi-host environments
WO2002095578A1 (en)*2001-05-212002-11-28Exigen GroupEnhanced communication scheme for objects in multi-host environments
US20020198848A1 (en)*2001-06-262002-12-26Michener John R.Transaction verification system and method
US20030051146A1 (en)*2001-09-112003-03-13Akihiro EbinaSecurity realizing system in network
US6560581B1 (en)1995-06-292003-05-06Visa International Service AssociationSystem and method for secure electronic commerce transaction
JP2003516097A (en)*1999-12-022003-05-07テレフオンアクチーボラゲット エル エム エリクソン(パブル) Synchronization of authentication encryption offset
US20030087223A1 (en)*1996-05-092003-05-08Walker Jay S.Method and apparatus for educational testing
US20030135744A1 (en)*2002-01-112003-07-17International Business Machines CorporationMethod and system for programming a non-volatile device in a data processing system
US6615348B1 (en)1999-04-162003-09-02Intel CorporationMethod and apparatus for an adapted digital signature
US20030187799A1 (en)*2002-02-272003-10-02William SellarsMultiple party content distribution system and method with rights management features
US6658568B1 (en)1995-02-132003-12-02Intertrust Technologies CorporationTrusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US20040117321A1 (en)*1999-07-302004-06-17Sancho Enrique DavidSystem and method for secure network purchasing
US20040186996A1 (en)*2000-03-292004-09-23Gibbs Benjamin K.Unique digital signature
US20040205344A1 (en)*2000-07-172004-10-14Otway David JohnStrong mutual authentication of devices
US20040205205A1 (en)*1998-11-242004-10-14Patterson Patrick E.Tracking electronic content
US20040252838A1 (en)*2003-06-132004-12-16Kenneth MaMechanism for secure transmission of signals in wireless communication devices
US20040254890A1 (en)*2002-05-242004-12-16Sancho Enrique DavidSystem method and apparatus for preventing fraudulent transactions
US20050010536A1 (en)*2002-02-272005-01-13Imagineer Software, Inc.Secure communication and real-time watermarking using mutating identifiers
US20050010786A1 (en)*2001-03-302005-01-13Michener John R.Trusted authorization device
US20050021940A1 (en)*2003-06-132005-01-27Kenneth MaAuthentication mechanism for wireless communication devices
US6868408B1 (en)*1994-04-282005-03-15Citibank, N.A.Security systems and methods applicable to an electronic monetary system
US6912655B1 (en)1999-08-092005-06-28Tristrata Security Inc.Network security architecture system utilizing seals
US6918035B1 (en)*1998-07-312005-07-12Lucent Technologies Inc.Method for two-party authentication and key agreement
US20050169255A1 (en)*1999-04-162005-08-04Tsutomu ShimomuraMethods and apparatus for broadcasting data
US6938021B2 (en)1997-11-062005-08-30Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6948070B1 (en)1995-02-132005-09-20Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US6970566B1 (en)*1999-02-182005-11-29Fujitsu LimitedNetwork system and method for secure communication service
US6986040B1 (en)2000-11-032006-01-10Citrix Systems, Inc.System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US20060093142A1 (en)*1995-11-222006-05-04Bruce SchneierMethods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US7047408B1 (en)*2000-03-172006-05-16Lucent Technologies Inc.Secure mutual network authentication and key exchange protocol
US7051111B1 (en)2000-04-252006-05-23Digeo, Inc.Multiple source proxy management system
US7062500B1 (en)1997-02-252006-06-13Intertrust Technologies Corp.Techniques for defining, using and manipulating rights management data structures
US7069451B1 (en)1995-02-132006-06-27Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7076656B2 (en)*2001-04-052006-07-11Lucent Technologies Inc.Methods and apparatus for providing efficient password-authenticated key exchange
US20060173794A1 (en)*2002-02-272006-08-03Imagineer Software, Inc.Secure electronic commerce using mutating identifiers
US7095854B1 (en)1995-02-132006-08-22Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7096192B1 (en)1997-07-282006-08-22Cybersource CorporationMethod and system for detecting fraud in a credit card transaction over a computer network
US20060195402A1 (en)*2002-02-272006-08-31Imagineer Software, Inc.Secure data transmission using undiscoverable or black data
US20060195400A1 (en)*2000-10-132006-08-31Patrick PattersonControlling access to electronic content
US20060218014A1 (en)*2000-03-102006-09-28Walker Jay SMethods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines
US7124302B2 (en)1995-02-132006-10-17Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US20060234793A1 (en)*1995-11-222006-10-19Walker Jay SMethod and apparatus for outputting a result of a game via a container
US7133846B1 (en)1995-02-132006-11-07Intertrust Technologies Corp.Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US7133845B1 (en)1995-02-132006-11-07Intertrust Technologies Corp.System and methods for secure transaction management and electronic rights protection
US7143290B1 (en)1995-02-132006-11-28Intertrust Technologies CorporationTrusted and secure techniques, systems and methods for item delivery and execution
US7143164B2 (en)2001-05-212006-11-28Exigen GroupDynamic object library software architecture
US20060276931A1 (en)*1995-11-222006-12-07Walker Jay SSystems and methods for improved health care compliance
US7165174B1 (en)1995-02-132007-01-16Intertrust Technologies Corp.Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
CN1311659C (en)*1996-10-312007-04-18松下电器产业株式会社One-way data conversion apparatus and device authentication system
US20070106570A1 (en)*1997-09-122007-05-10Peri HartmanMethod and system for placing a purchase order via a communications network
US7225463B2 (en)1997-10-242007-05-29Dusenbury Jr Richard GSecure network architecture method and apparatus
US7233948B1 (en)1998-03-162007-06-19Intertrust Technologies Corp.Methods and apparatus for persistent control and protection of content
US7243236B1 (en)1999-07-292007-07-10Intertrust Technologies Corp.Systems and methods for using cryptography to protect secure and insecure computing environments
US7272639B1 (en)1995-06-072007-09-18Soverain Software LlcInternet server access control and monitoring systems
US20070256140A1 (en)*2003-03-132007-11-01Venters Carl V IiiSecure streaming container
US7328453B2 (en)2001-05-092008-02-05Ecd Systems, Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US7333953B1 (en)2000-10-312008-02-19Wells Fargo Bank, N.A.Method and apparatus for integrated payments processing and decisioning for internet transactions
US20080114978A1 (en)*2005-02-142008-05-15Vesa Petteri LehtovirtaKey Delivery Method and Apparatus in a Communications System
US7376722B1 (en)1999-08-062008-05-20Red Sheriff LimitedNetwork resource monitoring and measurement system and method
US7386473B2 (en)1996-09-032008-06-10Nielsen Media Research, Inc.Content display monitoring by a processing system
US7403922B1 (en)1997-07-282008-07-22Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US7406516B2 (en)1997-03-212008-07-29Netratings, Inc.System and method for monitoring the use of a resource by a client connected to a computer network having one or more servers in communication with one or more clients
US7430670B1 (en)1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
US20080310623A1 (en)*2003-10-202008-12-18Phillips Ii Eugene BSecuring digital content system and method
US7512986B2 (en)2001-03-282009-03-31Nds LimitedDigital rights management system and method
US7562150B2 (en)1999-01-152009-07-14Drm Technologies, LlcDelivering electronic content
US20090232308A1 (en)*2008-03-172009-09-17Sony CorporationSystem and method for scrambling wireless signals using a secure time value
EP1365611A4 (en)*2001-03-022009-09-23Fujitsu Ltd MOBILE COMMUNICATION SYSTEM AND THIS MAKING DEVICE
US7613633B1 (en)1995-04-262009-11-03Ebay Inc.Method for facilitating commerce at an internet-based auction
US7647243B2 (en)1995-11-072010-01-12Ebay Inc.Electronic marketplace system and method for creation of a two-tiered pricing scheme
US20100100946A1 (en)*2008-10-162010-04-22Verisign, Inc.Transparent Client Authentication
US7792705B2 (en)1997-09-122010-09-07Amazon.Com, Inc.Method and system for placing a purchase order via a communications network
US7818572B2 (en)2003-12-092010-10-19Dominic KotabSecurity system and method
US7865427B2 (en)2001-05-302011-01-04Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US7917436B2 (en)1995-07-072011-03-29At&T Intellectual Property I, L.P.Internet billing method
US7970652B1 (en)1995-04-262011-06-28Ebay Inc.Apparatus and method for remote sellers to initiate auction instances at an auction facilitator system and receive or make payment for items bought and sold with the system by book entry accounting between participant accounts accessible to the system
US7970722B1 (en)1999-11-082011-06-28Aloft Media, LlcSystem, method and computer program product for a collaborative decision platform
USRE42892E1 (en)1995-10-062011-11-01Netscape Communications CorporationMethod and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes
US8145567B2 (en)2000-10-312012-03-27Wells Fargo Bank, N.A.Transaction ID system and process
US8190513B2 (en)1996-06-052012-05-29Fraud Control Systems.Com CorporationMethod of billing a purchase made over a computer network
US8204945B2 (en)2000-06-192012-06-19Stragent, LlcHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US8229844B2 (en)1996-06-052012-07-24Fraud Control Systems.Com CorporationMethod of billing a purchase made over a computer network
US20120233687A1 (en)*2011-03-082012-09-13Metivier PascalSecure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US8271778B1 (en)2002-07-242012-09-18The Nielsen Company (Us), LlcSystem and method for monitoring secure data on a network
US8510226B2 (en)1996-02-262013-08-13Graphon CorporationMethod for synchronous encryption between a client and a licensing agent
US8630942B2 (en)1996-06-052014-01-14Fraud Control Systems.Com CorporationMethod of billing a purchase made over a computer network
US8661111B1 (en)2000-01-122014-02-25The Nielsen Company (Us), LlcSystem and method for estimating prevalence of digital content on the world-wide-web
US8744956B1 (en)2010-07-012014-06-03Experian Information Solutions, Inc.Systems and methods for permission arbitrated transaction services
US8856894B1 (en)2012-11-282014-10-07Consumerinfo.Com, Inc.Always on authentication
US8931058B2 (en)2010-07-012015-01-06Experian Information Solutions, Inc.Systems and methods for permission arbitrated transaction services
US9147042B1 (en)2010-11-222015-09-29Experian Information Solutions, Inc.Systems and methods for data verification
US9185435B2 (en)2013-06-252015-11-10The Nielsen Company (Us), LlcMethods and apparatus to characterize households with media meter data
US9277265B2 (en)2014-02-112016-03-01The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US9542553B1 (en)2011-09-162017-01-10Consumerinfo.Com, Inc.Systems and methods of identity protection and management
US20170063556A1 (en)*2002-07-262017-03-02Koninklijke Philips N.V.Secure authenticated distance measurement
US9607336B1 (en)2011-06-162017-03-28Consumerinfo.Com, Inc.Providing credit inquiry alerts
US9633322B1 (en)2013-03-152017-04-25Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US9721147B1 (en)2013-05-232017-08-01Consumerinfo.Com, Inc.Digital identity
US9848224B2 (en)2015-08-272017-12-19The Nielsen Company(Us), LlcMethods and apparatus to estimate demographics of a household
US9900305B2 (en)1998-01-122018-02-20Soverain Ip, LlcInternet server access control and monitoring systems
US10075446B2 (en)2008-06-262018-09-11Experian Marketing Solutions, Inc.Systems and methods for providing an integrated identifier
US20180317054A1 (en)*2013-03-142018-11-01Telcom Ventures, LlcSystems, methods, and devices for verifying a user identity and/or enabling/disabling an action, using a current and/or previous user location
US10219039B2 (en)2015-03-092019-02-26The Nielsen Company (Us), LlcMethods and apparatus to assign viewers to media meter data
US10373240B1 (en)2014-04-252019-08-06Csidentity CorporationSystems, methods and computer-program products for eligibility verification
US10630466B1 (en)*2016-11-032020-04-21Hologram, Inc.Apparatus and method for exchanging cryptographic information with reduced overhead and latency
US10664936B2 (en)2013-03-152020-05-26Csidentity CorporationAuthentication systems and methods for on-demand products
US10791355B2 (en)2016-12-202020-09-29The Nielsen Company (Us), LlcMethods and apparatus to determine probabilistic media viewing metrics
US10911234B2 (en)2018-06-222021-02-02Experian Information Solutions, Inc.System and method for a token gateway environment
US11200306B1 (en)2021-02-252021-12-14Telcom Ventures, LlcMethods, devices, and systems for authenticating user identity for location-based deliveries
US11941065B1 (en)2019-09-132024-03-26Experian Information Solutions, Inc.Single identifier platform for storing entity data
US12014328B2 (en)2005-07-132024-06-18Vccb Holdings, Inc.Medicine bottle cap with electronic embedded curved display

Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4503287A (en)*1981-11-231985-03-05Analytics, Inc.Two-tiered communication security employing asymmetric session keys
US4578530A (en)*1981-06-261986-03-25Visa U.S.A., Inc.End-to-end encryption system and method of operation
US4601011A (en)*1981-12-301986-07-15Avigdor GrynbergUser authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units
US4710613A (en)*1984-12-131987-12-01Casio Computer Co., Ltd.Identification system
US4881263A (en)*1987-09-251989-11-14Digital Equipment CorporationApparatus and method for secure transmission of data over an unsecure transmission channel
US4888800A (en)*1987-03-031989-12-19Hewlett-Packard CompanySecure messaging systems
US4924513A (en)*1987-09-251990-05-08Digital Equipment CorporationApparatus and method for secure transmission of data over an unsecure transmission channel
US5022080A (en)*1990-04-161991-06-04Durst Robert TElectronic notary
US5109413A (en)*1986-11-051992-04-28International Business Machines CorporationManipulating rights-to-execute in connection with a software copy protection mechanism
US5131039A (en)*1990-01-291992-07-14David ChaumOptionally moderated transaction systems
US5148481A (en)*1989-10-061992-09-15International Business Machines CorporationTransaction system security method and apparatus
US5175766A (en)*1988-12-091992-12-29The Exchange System Limited PartnershipSignalling scheme for controlling data encryption device in an electronic fund transaction processing system
US5218637A (en)*1987-09-071993-06-08L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espaceMethod of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization
US5226080A (en)*1990-06-221993-07-06Grid Systems CorporationMethod and apparatus for password protection of a computer
US5241599A (en)*1991-10-021993-08-31At&T Bell LaboratoriesCryptographic protocol for secure communications

Patent Citations (15)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US4578530A (en)*1981-06-261986-03-25Visa U.S.A., Inc.End-to-end encryption system and method of operation
US4503287A (en)*1981-11-231985-03-05Analytics, Inc.Two-tiered communication security employing asymmetric session keys
US4601011A (en)*1981-12-301986-07-15Avigdor GrynbergUser authorization verification apparatus for computer systems including a central device and a plurality of pocket sized remote units
US4710613A (en)*1984-12-131987-12-01Casio Computer Co., Ltd.Identification system
US5109413A (en)*1986-11-051992-04-28International Business Machines CorporationManipulating rights-to-execute in connection with a software copy protection mechanism
US4888800A (en)*1987-03-031989-12-19Hewlett-Packard CompanySecure messaging systems
US5218637A (en)*1987-09-071993-06-08L'etat Francais Represente Par Le Ministre Des Postes, Des Telecommunications Et De L'espaceMethod of transferring a secret, by the exchange of two certificates between two microcomputers which establish reciprocal authorization
US4924513A (en)*1987-09-251990-05-08Digital Equipment CorporationApparatus and method for secure transmission of data over an unsecure transmission channel
US4881263A (en)*1987-09-251989-11-14Digital Equipment CorporationApparatus and method for secure transmission of data over an unsecure transmission channel
US5175766A (en)*1988-12-091992-12-29The Exchange System Limited PartnershipSignalling scheme for controlling data encryption device in an electronic fund transaction processing system
US5148481A (en)*1989-10-061992-09-15International Business Machines CorporationTransaction system security method and apparatus
US5131039A (en)*1990-01-291992-07-14David ChaumOptionally moderated transaction systems
US5022080A (en)*1990-04-161991-06-04Durst Robert TElectronic notary
US5226080A (en)*1990-06-221993-07-06Grid Systems CorporationMethod and apparatus for password protection of a computer
US5241599A (en)*1991-10-021993-08-31At&T Bell LaboratoriesCryptographic protocol for secure communications

Cited By (349)

* Cited by examiner, † Cited by third party
Publication numberPriority datePublication dateAssigneeTitle
US5524072A (en)*1991-12-041996-06-04Enco-Tone Ltd.Methods and apparatus for data encryption and transmission
US5742684A (en)*1991-12-041998-04-21Enco-Tone Ltd.Method and apparatus for data encryption and transmission
US6205437B1 (en)1993-12-162001-03-20Open Market, Inc.Open network payment system for providing for real-time authorization of payment and purchase transactions
US6049785A (en)*1993-12-162000-04-11Open Market, Inc.Open network payment system for providing for authentication of payment orders based on a confirmation electronic mail message
US6195649B1 (en)1993-12-162001-02-27Open Market, Inc.Digital active advertising
US6199051B1 (en)1993-12-162001-03-06Open Market, Inc.Digital active advertising
US5724424A (en)*1993-12-161998-03-03Open Market, Inc.Digital active advertising
US6868408B1 (en)*1994-04-282005-03-15Citibank, N.A.Security systems and methods applicable to an electronic monetary system
US5745573A (en)*1994-08-111998-04-28Trusted Information Systems, Inc.System and method for controlling access to a user secret
US5557765A (en)*1994-08-111996-09-17Trusted Information Systems, Inc.System and method for data recovery
US5991406A (en)*1994-08-111999-11-23Network Associates, Inc.System and method for data recovery
US5956403A (en)*1994-08-111999-09-21Network Association, Inc.System and method for access field verification
US5909492A (en)*1994-10-241999-06-01Open Market, IncorporatedNetwork sales system
US5715314A (en)*1994-10-241998-02-03Open Market, Inc.Network sales system
US6449599B1 (en)1994-10-242002-09-10Open Market, Inc.Network sales system
US5748739A (en)*1994-11-051998-05-05International Computers LimitedAccess control for sensitive functions
US7095854B1 (en)1995-02-132006-08-22Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7120800B2 (en)1995-02-132006-10-10Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7281133B2 (en)1995-02-132007-10-09Intertrust Technologies Corp.Trusted and secure techniques, systems and methods for item delivery and execution
US5910987A (en)1995-02-131999-06-08Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5915019A (en)1995-02-131999-06-22Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US5917912A (en)1995-02-131999-06-29Intertrust Technologies CorporationSystem and methods for secure transaction management and electronic rights protection
US7165174B1 (en)1995-02-132007-01-16Intertrust Technologies Corp.Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US7143290B1 (en)1995-02-132006-11-28Intertrust Technologies CorporationTrusted and secure techniques, systems and methods for item delivery and execution
US5949876A (en)*1995-02-131999-09-07Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US7133845B1 (en)1995-02-132006-11-07Intertrust Technologies Corp.System and methods for secure transaction management and electronic rights protection
US6658568B1 (en)1995-02-132003-12-02Intertrust Technologies CorporationTrusted infrastructure support system, methods and techniques for secure electronic commerce transaction and rights management
US8543842B2 (en)1995-02-132013-09-24Intertrust Technologies CorporationSystem and methods for secure transaction management and electronics rights protection
US5982891A (en)1995-02-131999-11-09Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US8185473B2 (en)1995-02-132012-05-22Intertrust Technologies CorporationTrusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US7133846B1 (en)1995-02-132006-11-07Intertrust Technologies Corp.Digital certificate support system, methods and techniques for secure electronic commerce transaction and rights management
US7392395B2 (en)1995-02-132008-06-24Intertrust Technologies Corp.Trusted and secure techniques, systems and methods for item delivery and execution
US7124302B2 (en)1995-02-132006-10-17Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6237786B1 (en)1995-02-132001-05-29Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US8751793B2 (en)1995-02-132014-06-10Intertrust Technologies Corp.Trusted infrastructure support systems, methods and techniques for secure electronic commerce transaction and rights management
US7100199B2 (en)1995-02-132006-08-29Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6427140B1 (en)1995-02-132002-07-30Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6389402B1 (en)1995-02-132002-05-14Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7076652B2 (en)1995-02-132006-07-11Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US7844835B2 (en)1995-02-132010-11-30Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US7069451B1 (en)1995-02-132006-06-27Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6363488B1 (en)1995-02-132002-03-26Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7051212B2 (en)1995-02-132006-05-23Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US6185683B1 (en)1995-02-132001-02-06Intertrust Technologies Corp.Trusted and secure techniques, systems and methods for item delivery and execution
US6948070B1 (en)1995-02-132005-09-20Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US7917749B2 (en)1995-02-132011-03-29Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US7415617B2 (en)1995-02-132008-08-19Intertrust Technologies Corp.Trusted infrastructure support systems, methods and techniques for secure electronic commerce, electronic transactions, commerce process control and automation, distributed computing, and rights management
US6253193B1 (en)1995-02-132001-06-26Intertrust Technologies CorporationSystems and methods for the secure transaction management and electronic rights protection
US6272632B1 (en)1995-02-212001-08-07Network Associates, Inc.System and method for controlling access to a user secret using a key recovery field
US8392273B2 (en)1995-04-262013-03-05Ebay Inc.Marketplace payments
US7831477B2 (en)1995-04-262010-11-09Ebay Inc.Method for reposting a good for sale using a consignment node
US8352328B2 (en)1995-04-262013-01-08Ebay Inc.Methods and systems for searching for goods in a virtual marketplace
US7970652B1 (en)1995-04-262011-06-28Ebay Inc.Apparatus and method for remote sellers to initiate auction instances at an auction facilitator system and receive or make payment for items bought and sold with the system by book entry accounting between participant accounts accessible to the system
US8332279B2 (en)1995-04-262012-12-11Ebay Inc.Methods and systems for searching for goods and services
US8332278B2 (en)1995-04-262012-12-11Ebay Inc.Method and system for retrieving information regarding an item posted for sale
US7613633B1 (en)1995-04-262009-11-03Ebay Inc.Method for facilitating commerce at an internet-based auction
US8355956B2 (en)1995-04-262013-01-15Ebay Inc.Marketing goods with bar codes
US8341028B2 (en)1995-04-262012-12-25Ebay Inc.Methods and systems for searching for goods
US7702540B1 (en)*1995-04-262010-04-20Ebay Inc.Computer-implement method and system for conducting auctions on the internet
WO1996037065A1 (en)*1995-05-181996-11-21Defa A/SSecure one-way communication system
US8606900B1 (en)1995-06-072013-12-10Soverain Software LlcMethod and system for counting web access requests
US7272639B1 (en)1995-06-072007-09-18Soverain Software LlcInternet server access control and monitoring systems
US8635327B1 (en)1995-06-072014-01-21Soverain Software LlcWeb advertising method
EP0836774A4 (en)*1995-06-082000-12-13Wave Sys CorpEncrypted data package record for use in remote transaction metered data system
US6560581B1 (en)1995-06-292003-05-06Visa International Service AssociationSystem and method for secure electronic commerce transaction
US8086532B2 (en)1995-07-072011-12-27At&T Intellectual Property I, L.P.Internet billing method
US7917436B2 (en)1995-07-072011-03-29At&T Intellectual Property I, L.P.Internet billing method
US5812669A (en)*1995-07-191998-09-22Jenkins; LewMethod and system for providing secure EDI over an open network
USRE42892E1 (en)1995-10-062011-11-01Netscape Communications CorporationMethod and apparatus for maintaining state information on an HTTP client system in relation to server domain and path attributes
US5717756A (en)*1995-10-121998-02-10International Business Machines CorporationSystem and method for providing masquerade protection in a computer network using hardware and timestamp-specific single use keys
US5960086A (en)*1995-11-021999-09-28Tri-Strata Security, Inc.Unified end-to-end security methods and systems for operating on insecure networks
WO1997016902A3 (en)*1995-11-021997-08-28Tri Strata Security IncUnified end-to-end security methods and systems for operating on insecure networks
US7647243B2 (en)1995-11-072010-01-12Ebay Inc.Electronic marketplace system and method for creation of a two-tiered pricing scheme
US8092224B2 (en)1995-11-222012-01-10James A. JoraschSystems and methods for improved health care compliance
US8556728B2 (en)1995-11-222013-10-15James A. JoraschMethod and apparatus for outputting a result of a game via a container
US20060093142A1 (en)*1995-11-222006-05-04Bruce SchneierMethods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US20060276931A1 (en)*1995-11-222006-12-07Walker Jay SSystems and methods for improved health care compliance
US7362862B2 (en)1995-11-222008-04-22Walker Digital, LlcMethods and apparatus for awarding prizes based on authentication of computer generated outcomes using coupons
US8262394B2 (en)1995-11-222012-09-11James A. JoraschSystems and methods for improved health care compliance
US7553235B2 (en)1995-11-222009-06-30Walker Digital, LlcMethod and apparatus for outputting a result of a game via a container
US5768382A (en)*1995-11-221998-06-16Walker Asset Management Limited PartnershipRemote-auditing of computer generated outcomes and authenticated biling and access control system using cryptographic and other protocols
US20060234792A1 (en)*1995-11-222006-10-19Walker Jay SMethod and apparatus for outputting a result of a game via a container
US7821404B2 (en)1995-11-222010-10-26James A. JoraschSystems and methods for improved health care compliance
US7553234B2 (en)1995-11-222009-06-30Walker Digital, LlcMethod and apparatus for outputting a result of a game via a container
US20060234793A1 (en)*1995-11-222006-10-19Walker Jay SMethod and apparatus for outputting a result of a game via a container
US8353752B2 (en)1995-11-222013-01-15James A. JoraschMethod and apparatus for outputting a result of a game via a container
US8510226B2 (en)1996-02-262013-08-13Graphon CorporationMethod for synchronous encryption between a client and a licensing agent
US5838790A (en)*1996-04-191998-11-17Juno Online Services, L.P.Advertisement authentication system in which advertisements are downloaded for off-line display
US8086167B2 (en)1996-05-092011-12-27Walker Digital, LlcMethod and apparatus for educational testing
US20030087223A1 (en)*1996-05-092003-05-08Walker Jay S.Method and apparatus for educational testing
US20090170058A1 (en)*1996-05-092009-07-02Walker Jay SMethod and apparatus for educational testing
US5947747A (en)*1996-05-091999-09-07Walker Asset Management Limited PartnershipMethod and apparatus for computer-based educational testing
US8725060B2 (en)1996-05-092014-05-13Inventor Holdings, LlcMethod and apparatus for educational testing
US7483670B2 (en)1996-05-092009-01-27Walker Digital, LlcMethod and apparatus for educational testing
EP0809379A3 (en)*1996-05-222000-10-18Matsushita Electric Industrial Co., Ltd.Authentication apparatus according to the challenge-response principle
KR100473536B1 (en)*1996-05-222005-05-16마츠시타 덴끼 산교 가부시키가이샤An encryption apparatus for ensuring security in communication between devices and communication system
US8190513B2 (en)1996-06-052012-05-29Fraud Control Systems.Com CorporationMethod of billing a purchase made over a computer network
US8229844B2 (en)1996-06-052012-07-24Fraud Control Systems.Com CorporationMethod of billing a purchase made over a computer network
US8630942B2 (en)1996-06-052014-01-14Fraud Control Systems.Com CorporationMethod of billing a purchase made over a computer network
US20020080972A1 (en)*1996-06-282002-06-27Takehisa KatoMethod and apparatus of enciphering and deciphering data using keys enciphered and deciphered with other keys
US7433474B2 (en)1996-06-282008-10-07Kabushiki Kaisha ToshibaMethod and apparatus of enciphering and deciphering data using keys enciphered and deciphered with other keys
CN1293719C (en)*1996-06-282007-01-03株式会社东芝 Recording device and method, decoding device and method, and recording and reproducing device
US20080279383A1 (en)*1996-06-282008-11-13Kabushiki Kaisha ToshibaMethod and apparatus of enciphering and deciphering data using multiple keys
US5943422A (en)1996-08-121999-08-24Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US7925898B2 (en)1996-08-122011-04-12Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US6240185B1 (en)1996-08-122001-05-29Intertrust Technologies CorporationSteganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US8307212B2 (en)1996-08-122012-11-06Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6618484B2 (en)1996-08-122003-09-09Intertrust Technologies CorporationSteganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US6292569B1 (en)1996-08-122001-09-18Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US7120802B2 (en)1996-08-122006-10-10Intertrust Technologies Corp.Systems and methods for using cryptography to protect secure computing environments
US6157721A (en)1996-08-122000-12-05Intertrust Technologies Corp.Systems and methods using cryptography to protect secure computing environments
US6449367B2 (en)1996-08-122002-09-10Intertrust Technologies Corp.Steganographic techniques for securely delivering electronic digital rights management control information over insecure communication channels
US8533851B2 (en)1996-08-302013-09-10Intertrust Technologies CorporationSystems and methods for secure transaction management and electronic rights protection
US5892900A (en)1996-08-301999-04-06Intertrust Technologies Corp.Systems and methods for secure transaction management and electronic rights protection
US7590568B2 (en)1996-09-032009-09-15The Nielsen Company (Us), LlcContent display monitor
US7386473B2 (en)1996-09-032008-06-10Nielsen Media Research, Inc.Content display monitoring by a processing system
US7653724B2 (en)1996-09-032010-01-26The Nielsen Company (Us), Llc.Content display monitor
US8769394B2 (en)1996-09-032014-07-01Comscore, Inc.Content display monitor
US8719698B2 (en)1996-09-032014-05-06Comscore, Inc.Content display monitor
US7613635B2 (en)1996-09-032009-11-03The Nielsen Company (Us), LlcContent display monitor
US7756974B2 (en)1996-09-032010-07-13The Nielsen Company (Us), Llc.Content display monitor
US8713428B2 (en)1996-09-032014-04-29Comscore, Inc.Content display monitor
US7716326B2 (en)1996-09-032010-05-11The Nielsen Company (Us), Llc.Content display monitor
US7720964B2 (en)1996-09-032010-05-18The Nielsen Company (Us), LlcContent display monitor
US7644156B2 (en)1996-09-032010-01-05The Nielsen Company(US), LLC.Content display monitor
US7650407B2 (en)1996-09-032010-01-19The Nielsen Company (Us), Llc.Content display monitor
US7720963B2 (en)1996-09-032010-05-18The Nielsen Company (Us), LlcContent display monitor
US6052780A (en)*1996-09-122000-04-18Open Security Solutions, LlcComputer system and process for accessing an encrypted and self-decrypting digital information product while restricting access to decrypted digital information
CN1311659C (en)*1996-10-312007-04-18松下电器产业株式会社One-way data conversion apparatus and device authentication system
US6088449A (en)*1996-11-052000-07-11Tri-Strata Security, Inc.Tri-signature security architecture systems and methods
US6075860A (en)*1997-02-192000-06-133Com CorporationApparatus and method for authentication and encryption of a remote terminal over a wireless link
WO1998037661A1 (en)*1997-02-191998-08-27U.S. Robotics Mobile Communications Corp.Apparatus and method for authentification and encryption of a remote terminal over a wireless link
US7062500B1 (en)1997-02-252006-06-13Intertrust Technologies Corp.Techniques for defining, using and manipulating rights management data structures
US6138119A (en)1997-02-252000-10-24Intertrust Technologies Corp.Techniques for defining, using and manipulating rights management data structures
US5920861A (en)1997-02-251999-07-06Intertrust Technologies Corp.Techniques for defining using and manipulating rights management data structures
US7406516B2 (en)1997-03-212008-07-29Netratings, Inc.System and method for monitoring the use of a resource by a client connected to a computer network having one or more servers in communication with one or more clients
EP0881559A1 (en)*1997-05-281998-12-02Siemens AktiengesellschaftComputer system for protecting software and a method for protecting software
US6651169B1 (en)1997-05-282003-11-18Fujitsu Siemens ComputersProtection of software using a challenge-response protocol embedded in the software
EP0881558A1 (en)*1997-05-281998-12-02Siemens AktiengesellschaftComputer system for protecting software and a method for protecting software
EP0881557A1 (en)*1997-05-281998-12-02Siemens AktiengesellschaftComputer system for protecting software and a method for protecting software
US7096192B1 (en)1997-07-282006-08-22Cybersource CorporationMethod and system for detecting fraud in a credit card transaction over a computer network
US20080281743A1 (en)*1997-07-282008-11-13John Philip PettitMethod and system for detecting fraud in a credit card transaction over the internet
US7403922B1 (en)1997-07-282008-07-22Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US7970701B2 (en)1997-07-282011-06-28Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US6029154A (en)*1997-07-282000-02-22Internet Commerce Services CorporationMethod and system for detecting fraud in a credit card transaction over the internet
US8244629B2 (en)1997-07-282012-08-14Michael LewisMethod and apparatus for generating a bi-gram score in fraud risk analysis
US7752084B2 (en)1997-07-282010-07-06Cybersource CorporationMethod and system for detecting fraud in a credit card transaction over the internet
US7792705B2 (en)1997-09-122010-09-07Amazon.Com, Inc.Method and system for placing a purchase order via a communications network
US20070106570A1 (en)*1997-09-122007-05-10Peri HartmanMethod and system for placing a purchase order via a communications network
US8341036B2 (en)1997-09-122012-12-25Amazon.Com, Inc.Combining disparate purchases into a single purchase order for billing and shipment
US6189101B1 (en)1997-10-242001-02-13Richard G. Dusenbury, Jr.Secure network architecture method and apparatus
US7225463B2 (en)1997-10-242007-05-29Dusenbury Jr Richard GSecure network architecture method and apparatus
US7092914B1 (en)1997-11-062006-08-15Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7143066B2 (en)1997-11-062006-11-28Intertrust Technologies Corp.Systems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6938021B2 (en)1997-11-062005-08-30Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US6112181A (en)1997-11-062000-08-29Intertrust Technologies CorporationSystems and methods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US7110983B2 (en)1997-11-062006-09-19Intertrust Technologies CorporationMethods for matching, selecting, narrowcasting, and/or classifying based on rights management and/or other information
US9917827B2 (en)1998-01-122018-03-13Soverain Ip, LlcInternet server access control and monitoring systems
US9900305B2 (en)1998-01-122018-02-20Soverain Ip, LlcInternet server access control and monitoring systems
US7233948B1 (en)1998-03-162007-06-19Intertrust Technologies Corp.Methods and apparatus for persistent control and protection of content
US6144988A (en)*1998-07-232000-11-07Experian Marketing Solutions, Inc.Computer system and method for securely formatting and mapping data for internet web sites
US6918035B1 (en)*1998-07-312005-07-12Lucent Technologies Inc.Method for two-party authentication and key agreement
US6085321A (en)*1998-08-142000-07-04Omnipoint CorporationUnique digital signature
US6356935B1 (en)1998-08-142002-03-12Xircom Wireless, Inc.Apparatus and method for an authenticated electronic userid
US6795919B1 (en)1998-08-142004-09-21Intel CorporationUnique digital signature
US20040205205A1 (en)*1998-11-242004-10-14Patterson Patrick E.Tracking electronic content
US9191372B2 (en)1998-11-242015-11-17Digital Reg Of Texas, LlcTracking electronic content
US7673059B2 (en)1998-11-242010-03-02Drm Technologies, LlcTracking electronic content
US8086746B2 (en)1999-01-152011-12-27Digital Reg of Texas, LLC.Delivering electronic content
US9094479B2 (en)1999-01-152015-07-28Digital Reg Of Texas, LlcDelivering electronic content
US7562150B2 (en)1999-01-152009-07-14Drm Technologies, LlcDelivering electronic content
US6970566B1 (en)*1999-02-182005-11-29Fujitsu LimitedNetwork system and method for secure communication service
US6473858B1 (en)1999-04-162002-10-29Digeo, Inc.Method and apparatus for broadcasting data with access control
US6615348B1 (en)1999-04-162003-09-02Intel CorporationMethod and apparatus for an adapted digital signature
US8701140B2 (en)1999-04-162014-04-15Arris Enterprises, Inc.Methods and apparatus for broadcasting data
US20050169255A1 (en)*1999-04-162005-08-04Tsutomu ShimomuraMethods and apparatus for broadcasting data
US7155734B1 (en)1999-04-162006-12-26Digeo, Inc.Methods of operating a data broadcast service
WO2001001630A1 (en)*1999-06-252001-01-04Telefonaktiebolaget Lm Ericsson (Publ)Methods and arrangements for secure linking of entity authentication and ciphering key generation
US6633979B1 (en)1999-06-252003-10-14Telefonaktiebolaget Lm Ericsson (Publ)Methods and arrangements for secure linking of entity authentication and ciphering key generation
US7243236B1 (en)1999-07-292007-07-10Intertrust Technologies Corp.Systems and methods for using cryptography to protect secure and insecure computing environments
US7430670B1 (en)1999-07-292008-09-30Intertrust Technologies Corp.Software self-defense systems and methods
US20040117321A1 (en)*1999-07-302004-06-17Sancho Enrique DavidSystem and method for secure network purchasing
US20050108177A1 (en)*1999-07-302005-05-19Sancho Enrique D.System and method for secure network purchasing
US7366702B2 (en)1999-07-302008-04-29Ipass Inc.System and method for secure network purchasing
US20020073046A1 (en)*1999-07-302002-06-13David Sancho EnriqueSystem and method for secure network purchasing
US8112511B2 (en)1999-08-062012-02-07The Nielsen Company (Us), LlcNetwork resource monitoring and measurement system and method
US9992092B2 (en)1999-08-062018-06-05Comscore, Inc.Network resource monitoring and measurement system and method
US7376722B1 (en)1999-08-062008-05-20Red Sheriff LimitedNetwork resource monitoring and measurement system and method
US7953791B2 (en)1999-08-062011-05-31The Nielsen Company (Us), Llc.Network resource monitoring and measurement system and method
US7953839B2 (en)1999-08-062011-05-31The Nielsen Company (Us), Llc.Network resource monitoring and measurement system and method
US8495198B2 (en)1999-08-062013-07-23Comscore, Inc.Network resource monitoring and measurement system and method
US6912655B1 (en)1999-08-092005-06-28Tristrata Security Inc.Network security architecture system utilizing seals
US7257706B1 (en)1999-08-092007-08-14Tristrata Security, Inc.Method of securing a document in a system and controlling access to the document and a seal for use in the method
US7743249B1 (en)1999-08-092010-06-22Tristrata Security, Inc.Method of securing a document in a system and controlling access to the document and a seal for use in the method
US20080034437A1 (en)*1999-10-142008-02-07Drm Technologies, LlcControlling access to electronic content
US8005777B1 (en)1999-11-082011-08-23Aloft Media, LlcSystem, method and computer program product for a collaborative decision platform
US8160988B1 (en)1999-11-082012-04-17Aloft Media, LlcSystem, method and computer program product for a collaborative decision platform
US7970722B1 (en)1999-11-082011-06-28Aloft Media, LlcSystem, method and computer program product for a collaborative decision platform
JP2003516097A (en)*1999-12-022003-05-07テレフオンアクチーボラゲット エル エム エリクソン(パブル) Synchronization of authentication encryption offset
US9514479B2 (en)2000-01-122016-12-06The Nielsen Company (Us), LlcSystem and method for estimating prevalence of digital content on the world-wide-web
US8661111B1 (en)2000-01-122014-02-25The Nielsen Company (Us), LlcSystem and method for estimating prevalence of digital content on the world-wide-web
US20010034838A1 (en)*2000-01-142001-10-25Motoshi ItoControl program, device including the control program, method for creating the control program, and method for operating the control program
US7885899B1 (en)2000-02-082011-02-08Ipass Inc.System and method for secure network purchasing
US7801745B2 (en)2000-03-102010-09-21Walker Digital, LlcMethods and apparatus for increasing and/or monitoring a party's compliance with a schedule for taking medicines
US8055509B1 (en)2000-03-102011-11-08Walker Digital, LlcMethods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines
US20060218014A1 (en)*2000-03-102006-09-28Walker Jay SMethods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines
US8069056B2 (en)2000-03-102011-11-29Walker Digital, LlcMethods and apparatus for increasing and/or for monitoring a party's compliance with a schedule for taking medicines
US7047408B1 (en)*2000-03-172006-05-16Lucent Technologies Inc.Secure mutual network authentication and key exchange protocol
US20040186996A1 (en)*2000-03-292004-09-23Gibbs Benjamin K.Unique digital signature
US7051111B1 (en)2000-04-252006-05-23Digeo, Inc.Multiple source proxy management system
US8272060B2 (en)2000-06-192012-09-18Stragent, LlcHash-based systems and methods for detecting and preventing transmission of polymorphic network worms and viruses
US8204945B2 (en)2000-06-192012-06-19Stragent, LlcHash-based systems and methods for detecting and preventing transmission of unwanted e-mail
US7020773B1 (en)2000-07-172006-03-28Citrix Systems, Inc.Strong mutual authentication of devices
US7293176B2 (en)2000-07-172007-11-06Citrix Systems, Inc.Strong mutual authentication of devices
US20040205344A1 (en)*2000-07-172004-10-14Otway David JohnStrong mutual authentication of devices
US7565697B2 (en)2000-09-222009-07-21Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US7237123B2 (en)2000-09-222007-06-26Ecd Systems, Inc.Systems and methods for preventing unauthorized use of digital content
US8261359B2 (en)2000-09-222012-09-04Sca Ipla Holdings Inc.Systems and methods for preventing unauthorized use of digital content
US20020144153A1 (en)*2000-09-222002-10-03Levine Richard B.Systems and methods for preventing unauthorized use of digital content
US20020120854A1 (en)*2000-09-222002-08-29Levine Richard B.Systems and methods for preventing unauthorized use of digital content
US20060195400A1 (en)*2000-10-132006-08-31Patrick PattersonControlling access to electronic content
US7333953B1 (en)2000-10-312008-02-19Wells Fargo Bank, N.A.Method and apparatus for integrated payments processing and decisioning for internet transactions
US8407145B1 (en)2000-10-312013-03-26Wells Fargo Bank, N.A.Transaction ID system and process
US8204826B2 (en)2000-10-312012-06-19Wells Fargo Bank, N.A.Method and apparatus for integrated payments processing and decisioning for internet transactions
US8145567B2 (en)2000-10-312012-03-27Wells Fargo Bank, N.A.Transaction ID system and process
US6986040B1 (en)2000-11-032006-01-10Citrix Systems, Inc.System and method of exploiting the security of a secure communication channel to secure a non-secure communication channel
US20020110242A1 (en)*2000-12-192002-08-15Bruwer Frederick JohannesMethod of and apparatus for transferring data
WO2002050782A3 (en)*2000-12-192003-01-30Azoteq Pty LtdMethod of and apparatus for transferring data
US7529939B2 (en)2000-12-192009-05-05Azoteq Pty Ltd.Method of and apparatus for transferring data
EP1365611A4 (en)*2001-03-022009-09-23Fujitsu Ltd MOBILE COMMUNICATION SYSTEM AND THIS MAKING DEVICE
US7920702B2 (en)2001-03-282011-04-05Nds LimitedDigital rights management system and method
US7512986B2 (en)2001-03-282009-03-31Nds LimitedDigital rights management system and method
US20090154697A1 (en)*2001-03-282009-06-18Nds LimitedDigital rights management system and method
US7028191B2 (en)2001-03-302006-04-11Michener John RTrusted authorization device
US20050010786A1 (en)*2001-03-302005-01-13Michener John R.Trusted authorization device
US7076656B2 (en)*2001-04-052006-07-11Lucent Technologies Inc.Methods and apparatus for providing efficient password-authenticated key exchange
US20110231650A1 (en)*2001-05-012011-09-22Frank CoulierUse and generation of a session key in a secure socket layer connection
US7975139B2 (en)*2001-05-012011-07-05Vasco Data Security, Inc.Use and generation of a session key in a secure socket layer connection
US20020166048A1 (en)*2001-05-012002-11-07Frank CoulierUse and generation of a session key in a secure socket layer connection
US7328453B2 (en)2001-05-092008-02-05Ecd Systems, Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US8844048B2 (en)2001-05-092014-09-23Sca Ipla Holdings Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US8117667B2 (en)2001-05-092012-02-14Sca Ipla Holdings Inc.Systems and methods for the prevention of unauthorized use and manipulation of digital content
US20020174365A1 (en)*2001-05-212002-11-21Vadim AntonovEnhanced communication scheme for objects in multi-host environments
US7143164B2 (en)2001-05-212006-11-28Exigen GroupDynamic object library software architecture
WO2002095578A1 (en)*2001-05-212002-11-28Exigen GroupEnhanced communication scheme for objects in multi-host environments
US8019678B2 (en)2001-05-302011-09-13Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US7865427B2 (en)2001-05-302011-01-04Cybersource CorporationMethod and apparatus for evaluating fraud risk in an electronic commerce transaction
US20020198848A1 (en)*2001-06-262002-12-26Michener John R.Transaction verification system and method
US20030051146A1 (en)*2001-09-112003-03-13Akihiro EbinaSecurity realizing system in network
US20030135744A1 (en)*2002-01-112003-07-17International Business Machines CorporationMethod and system for programming a non-volatile device in a data processing system
US7376624B2 (en)2002-02-272008-05-20Imagineer Software, Inc.Secure communication and real-time watermarking using mutating identifiers
US20050010536A1 (en)*2002-02-272005-01-13Imagineer Software, Inc.Secure communication and real-time watermarking using mutating identifiers
US20060173794A1 (en)*2002-02-272006-08-03Imagineer Software, Inc.Secure electronic commerce using mutating identifiers
US20060031175A1 (en)*2002-02-272006-02-09Imagineer Software, Inc.Multiple party content distribution system and method with rights management features
US6996544B2 (en)2002-02-272006-02-07Imagineer Software, Inc.Multiple party content distribution system and method with rights management features
US7725404B2 (en)2002-02-272010-05-25Imagineer Software, Inc.Secure electronic commerce using mutating identifiers
US20060195402A1 (en)*2002-02-272006-08-31Imagineer Software, Inc.Secure data transmission using undiscoverable or black data
US20030187799A1 (en)*2002-02-272003-10-02William SellarsMultiple party content distribution system and method with rights management features
US20040254890A1 (en)*2002-05-242004-12-16Sancho Enrique DavidSystem method and apparatus for preventing fraudulent transactions
US8799643B2 (en)2002-07-242014-08-05The Nielsen Company (Us), LlcSystem and method for monitoring secure data on a network
US9401897B2 (en)2002-07-242016-07-26The Nielsen Company (Us), Llc.System and method for monitoring secure data on a network
US8271778B1 (en)2002-07-242012-09-18The Nielsen Company (Us), LlcSystem and method for monitoring secure data on a network
US20170063556A1 (en)*2002-07-262017-03-02Koninklijke Philips N.V.Secure authenticated distance measurement
US10091186B2 (en)*2002-07-262018-10-02Koninklijke Philips N.V.Secure authenticated distance measurement
US20070256140A1 (en)*2003-03-132007-11-01Venters Carl V IiiSecure streaming container
US20070283167A1 (en)*2003-03-132007-12-06Venters Carl V IiiSecure streaming container
US8001608B2 (en)2003-03-132011-08-16Digital Reg Of Texas, LlcSecure streaming container
US7987502B2 (en)2003-03-132011-07-26Digital Reg Of Texas, LlcSecure streaming container
US20040252838A1 (en)*2003-06-132004-12-16Kenneth MaMechanism for secure transmission of signals in wireless communication devices
US20050021940A1 (en)*2003-06-132005-01-27Kenneth MaAuthentication mechanism for wireless communication devices
US8270609B2 (en)2003-06-132012-09-18Broadcom CorporationMechanism for secure transmission of signals in wireless communication devices
US7979697B2 (en)2003-10-202011-07-12Digital Reg Of Texas, LlcSecuring digital content system and method
US20080310623A1 (en)*2003-10-202008-12-18Phillips Ii Eugene BSecuring digital content system and method
US20110002462A1 (en)*2003-12-092011-01-06Dominic KotabSecurity system and method
US8249251B2 (en)2003-12-092012-08-21Dominic M. KotabSecurity system and method
US9407445B2 (en)2003-12-092016-08-02Dominic M. KotabSecurity system and method
US7818572B2 (en)2003-12-092010-10-19Dominic KotabSecurity system and method
US9071447B2 (en)2003-12-092015-06-30Dominic M. KotabSecurity system and method
US8621200B2 (en)*2005-02-142013-12-31Telefonaktiebolaget Lm Ericsson (Publ)Key delivery method and apparatus in a communications system
US20080114978A1 (en)*2005-02-142008-05-15Vesa Petteri LehtovirtaKey Delivery Method and Apparatus in a Communications System
US12014328B2 (en)2005-07-132024-06-18Vccb Holdings, Inc.Medicine bottle cap with electronic embedded curved display
US20090232308A1 (en)*2008-03-172009-09-17Sony CorporationSystem and method for scrambling wireless signals using a secure time value
US8565431B2 (en)2008-03-172013-10-22Sony CorporationSystem and method for scrambling wireless signals using a secure time value
US11157872B2 (en)2008-06-262021-10-26Experian Marketing Solutions, LlcSystems and methods for providing an integrated identifier
US11769112B2 (en)2008-06-262023-09-26Experian Marketing Solutions, LlcSystems and methods for providing an integrated identifier
US10075446B2 (en)2008-06-262018-09-11Experian Marketing Solutions, Inc.Systems and methods for providing an integrated identifier
US12205076B2 (en)2008-06-262025-01-21Experian Marketing Solutions, LlcSystems and methods for providing an integrated identifier
US9225702B2 (en)2008-10-162015-12-29Verisign, Inc.Transparent client authentication
US8402519B2 (en)*2008-10-162013-03-19Verisign, Inc.Transparent client authentication
US20100100946A1 (en)*2008-10-162010-04-22Verisign, Inc.Transparent Client Authentication
US8931058B2 (en)2010-07-012015-01-06Experian Information Solutions, Inc.Systems and methods for permission arbitrated transaction services
US8744956B1 (en)2010-07-012014-06-03Experian Information Solutions, Inc.Systems and methods for permission arbitrated transaction services
US9147042B1 (en)2010-11-222015-09-29Experian Information Solutions, Inc.Systems and methods for data verification
US9684905B1 (en)2010-11-222017-06-20Experian Information Solutions, Inc.Systems and methods for data verification
US20120233687A1 (en)*2011-03-082012-09-13Metivier PascalSecure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US8793784B2 (en)*2011-03-082014-07-29Openways SasSecure method for controlling the opening of lock devices by means of a communicating object such as a mobile phone
US9607336B1 (en)2011-06-162017-03-28Consumerinfo.Com, Inc.Providing credit inquiry alerts
US11232413B1 (en)2011-06-162022-01-25Consumerinfo.Com, Inc.Authentication alerts
US11954655B1 (en)2011-06-162024-04-09Consumerinfo.Com, Inc.Authentication alerts
US10719873B1 (en)2011-06-162020-07-21Consumerinfo.Com, Inc.Providing credit inquiry alerts
US10685336B1 (en)2011-06-162020-06-16Consumerinfo.Com, Inc.Authentication alerts
US9665854B1 (en)2011-06-162017-05-30Consumerinfo.Com, Inc.Authentication alerts
US10115079B1 (en)2011-06-162018-10-30Consumerinfo.Com, Inc.Authentication alerts
US10642999B2 (en)2011-09-162020-05-05Consumerinfo.Com, Inc.Systems and methods of identity protection and management
US11087022B2 (en)2011-09-162021-08-10Consumerinfo.Com, Inc.Systems and methods of identity protection and management
US10061936B1 (en)2011-09-162018-08-28Consumerinfo.Com, Inc.Systems and methods of identity protection and management
US11790112B1 (en)2011-09-162023-10-17Consumerinfo.Com, Inc.Systems and methods of identity protection and management
US9542553B1 (en)2011-09-162017-01-10Consumerinfo.Com, Inc.Systems and methods of identity protection and management
US8856894B1 (en)2012-11-282014-10-07Consumerinfo.Com, Inc.Always on authentication
US20180317054A1 (en)*2013-03-142018-11-01Telcom Ventures, LlcSystems, methods, and devices for verifying a user identity and/or enabling/disabling an action, using a current and/or previous user location
US12346984B2 (en)2013-03-152025-07-01Csidentity CorporationSystems and methods of delayed authentication and billing for on-demand products
US11790473B2 (en)2013-03-152023-10-17Csidentity CorporationSystems and methods of delayed authentication and billing for on-demand products
US11288677B1 (en)2013-03-152022-03-29Consumerlnfo.com, Inc.Adjustment of knowledge-based authentication
US10664936B2 (en)2013-03-152020-05-26Csidentity CorporationAuthentication systems and methods for on-demand products
US11164271B2 (en)2013-03-152021-11-02Csidentity CorporationSystems and methods of delayed authentication and billing for on-demand products
US10169761B1 (en)2013-03-152019-01-01ConsumerInfo.com Inc.Adjustment of knowledge-based authentication
US10740762B2 (en)2013-03-152020-08-11Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US12190327B1 (en)2013-03-152025-01-07Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US11775979B1 (en)2013-03-152023-10-03Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US9633322B1 (en)2013-03-152017-04-25Consumerinfo.Com, Inc.Adjustment of knowledge-based authentication
US11803929B1 (en)2013-05-232023-10-31Consumerinfo.Com, Inc.Digital identity
US10453159B2 (en)2013-05-232019-10-22Consumerinfo.Com, Inc.Digital identity
US11120519B2 (en)2013-05-232021-09-14Consumerinfo.Com, Inc.Digital identity
US12333623B1 (en)2013-05-232025-06-17Consumerinfo.Com, Inc.Digital identity
US9721147B1 (en)2013-05-232017-08-01Consumerinfo.Com, Inc.Digital identity
US9185435B2 (en)2013-06-252015-11-10The Nielsen Company (Us), LlcMethods and apparatus to characterize households with media meter data
US9277265B2 (en)2014-02-112016-03-01The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US9544632B2 (en)2014-02-112017-01-10The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US9774900B2 (en)2014-02-112017-09-26The Nielsen Company (Us), LlcMethods and apparatus to calculate video-on-demand and dynamically inserted advertisement viewing probability
US11074641B1 (en)2014-04-252021-07-27Csidentity CorporationSystems, methods and computer-program products for eligibility verification
US10373240B1 (en)2014-04-252019-08-06Csidentity CorporationSystems, methods and computer-program products for eligibility verification
US11587150B1 (en)2014-04-252023-02-21Csidentity CorporationSystems and methods for eligibility verification
US10219039B2 (en)2015-03-092019-02-26The Nielsen Company (Us), LlcMethods and apparatus to assign viewers to media meter data
US10757480B2 (en)2015-03-092020-08-25The Nielsen Company (Us), LlcMethods and apparatus to assign viewers to media meter data
US11785301B2 (en)2015-03-092023-10-10The Nielsen Company (Us), LlcMethods and apparatus to assign viewers to media meter data
US11516543B2 (en)2015-03-092022-11-29The Nielsen Company (Us), LlcMethods and apparatus to assign viewers to media meter data
US9848224B2 (en)2015-08-272017-12-19The Nielsen Company(Us), LlcMethods and apparatus to estimate demographics of a household
US10298982B2 (en)2015-08-272019-05-21The Nielsen Company (Us), LlcMethods and apparatus to estimate demographics of a household
US11700405B2 (en)2015-08-272023-07-11The Nielsen Company (Us), LlcMethods and apparatus to estimate demographics of a household
US10924791B2 (en)2015-08-272021-02-16The Nielsen Company (Us), LlcMethods and apparatus to estimate demographics of a household
US10630466B1 (en)*2016-11-032020-04-21Hologram, Inc.Apparatus and method for exchanging cryptographic information with reduced overhead and latency
US10791355B2 (en)2016-12-202020-09-29The Nielsen Company (Us), LlcMethods and apparatus to determine probabilistic media viewing metrics
US11778255B2 (en)2016-12-202023-10-03The Nielsen Company (Us), LlcMethods and apparatus to determine probabilistic media viewing metrics
US10911234B2 (en)2018-06-222021-02-02Experian Information Solutions, Inc.System and method for a token gateway environment
US12132837B2 (en)2018-06-222024-10-29Experian Information Solutions, Inc.System and method for a token gateway environment
US11588639B2 (en)2018-06-222023-02-21Experian Information Solutions, Inc.System and method for a token gateway environment
US11941065B1 (en)2019-09-132024-03-26Experian Information Solutions, Inc.Single identifier platform for storing entity data
US12353482B1 (en)2019-09-132025-07-08Experian Information Solutions, Inc.Single identifier platform for storing entity data
US11200306B1 (en)2021-02-252021-12-14Telcom Ventures, LlcMethods, devices, and systems for authenticating user identity for location-based deliveries

Similar Documents

PublicationPublication DateTitle
US5351293A (en)System method and apparatus for authenticating an encrypted signal
CA2256881C (en)An automatic safe public communication system
US6044154A (en)Remote generated, device identifier key for use with a dual-key reflexive encryption security system
US5671283A (en)Secure communication system with cross linked cryptographic codes
EP0715242B1 (en)Method and system for digital information protection
US7702916B2 (en)Method and system for secure authentication
JP2746352B2 (en) Secure security communication system and method for communication by a remotely located computer
US5696824A (en)System for detecting unauthorized account access
US5636280A (en)Dual key reflexive encryption security system
WO1998045975A9 (en)Bilateral authentication and information encryption token system and method
JPH0648810B2 (en) Encryption key usage control method
WO1998045975A2 (en)Bilateral authentication and information encryption token system and method
KR20030095341A (en)Ic card and authentication method in electronic ticket distribution system
EP1023794A1 (en)System for detecting unauthorized account access
JPH07271884A (en)Terminal certification method
CN109711841B (en)Data transaction method and system, platform and storage medium
US20030187805A1 (en)System and method for secure electronic commerce trade
JP3348753B2 (en) Encryption key distribution system and method
CN101427280A (en)Secure electronic transaction system
US6424953B1 (en)Encrypting secrets in a file for an electronic micro-commerce system
CN119449427A (en) Terminal and cloud server communication method and system
CN116911988B (en)Transaction data processing method, system, computer equipment and storage medium
CN114465736B (en)Encryption authentication method, system, equipment and storage medium of U shield
US20010048747A1 (en)Method and device for implementing secured data transmission in a networked environment
JP3570781B2 (en) Software protection system

Legal Events

DateCodeTitleDescription
ASAssignment

Owner name:CRYPTOLOGICS INTERNATIONAL, INC., NEW JERSEY

Free format text:ASSIGNMENT OF ASSIGNORS INTEREST.;ASSIGNORS:MICHENER, JOHN R.;SAMIT, BENJAMIN;REEL/FRAME:006494/0454

Effective date:19930129

ASAssignment

Owner name:WAVE SYSTEMS CORP., NEW JERSEY

Free format text:CHANGE OF CORPORATE NAME OF ASSIGNEE;ASSIGNOR:CRYPTOLOGICS INTERNATIONAL, INC.;REEL/FRAME:006946/0524

Effective date:19930111

STCFInformation on status: patent grant

Free format text:PATENTED CASE

FPAYFee payment

Year of fee payment:4

FEPPFee payment procedure

Free format text:PAYOR NUMBER ASSIGNED (ORIGINAL EVENT CODE: ASPN); ENTITY STATUS OF PATENT OWNER: SMALL ENTITY

FPAYFee payment

Year of fee payment:8

FPAYFee payment

Year of fee payment:12

ASAssignment

Owner name:MARBLE BRIDGE FUNDING GROUP, INC., CALIFORNIA

Free format text:SECURITY INTEREST;ASSIGNOR:WAVE SYSTEMS CORP.;REEL/FRAME:037222/0703

Effective date:20151201


[8]ページ先頭

©2009-2025 Movatter.jp